General

  • Target

    JaffaCakes118_55d751c908745c2f4334526d1d09967a

  • Size

    150KB

  • Sample

    250306-lgpt4avrw7

  • MD5

    55d751c908745c2f4334526d1d09967a

  • SHA1

    d0ffbf4e40c650b894bed73537440e25535ea1b5

  • SHA256

    be39b755d4d86b50db73b11f8408701e8dfe3b8de1fe652d153803515569a334

  • SHA512

    1720482c2dd4b0e9d45ce2b2708fee0327dd153e45e3f53106993f95c5b59ab6aa4a10ea4a0f685234253f1cd049fdc6d2adbd1021ebd7b232a505564513f935

  • SSDEEP

    3072:tlxAxiiAYXRJ1cbuR3m8KoNVzbqQ+yaKf4baDJws3wDC:tePXD1zQuNV1+yiC

Malware Config

Targets

    • Target

      JaffaCakes118_55d751c908745c2f4334526d1d09967a

    • Size

      150KB

    • MD5

      55d751c908745c2f4334526d1d09967a

    • SHA1

      d0ffbf4e40c650b894bed73537440e25535ea1b5

    • SHA256

      be39b755d4d86b50db73b11f8408701e8dfe3b8de1fe652d153803515569a334

    • SHA512

      1720482c2dd4b0e9d45ce2b2708fee0327dd153e45e3f53106993f95c5b59ab6aa4a10ea4a0f685234253f1cd049fdc6d2adbd1021ebd7b232a505564513f935

    • SSDEEP

      3072:tlxAxiiAYXRJ1cbuR3m8KoNVzbqQ+yaKf4baDJws3wDC:tePXD1zQuNV1+yiC

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

MITRE ATT&CK Enterprise v15

Tasks