General

  • Target

    JaffaCakes118_55e87d644c383ee9fa9caf50cd9b738b

  • Size

    149KB

  • Sample

    250306-lx32nawlz4

  • MD5

    55e87d644c383ee9fa9caf50cd9b738b

  • SHA1

    c6dac2322699a6bbd28fdaf4272535a49939b9d9

  • SHA256

    10ef7e6d32e8398b2613989f9e5c978acb60161b1816e2630f5dd3469a9cf2e1

  • SHA512

    df709e1b5281d3375f8310fe370869a4153f43a3a2041d2f46cb5c8452bbec1a4ffa9048d4dbc859831c982b5e2bb1e67878d9a30d27130611c73f3290bb1e7b

  • SSDEEP

    3072:P2T7uCWOhANdpgMxsdSyg4TvtcMk8Lyzb8ckivlu5KgiCbmN:PW7uCWOh4pl2GkGMkSgb8Svlu5KgON

Malware Config

Targets

    • Target

      JaffaCakes118_55e87d644c383ee9fa9caf50cd9b738b

    • Size

      149KB

    • MD5

      55e87d644c383ee9fa9caf50cd9b738b

    • SHA1

      c6dac2322699a6bbd28fdaf4272535a49939b9d9

    • SHA256

      10ef7e6d32e8398b2613989f9e5c978acb60161b1816e2630f5dd3469a9cf2e1

    • SHA512

      df709e1b5281d3375f8310fe370869a4153f43a3a2041d2f46cb5c8452bbec1a4ffa9048d4dbc859831c982b5e2bb1e67878d9a30d27130611c73f3290bb1e7b

    • SSDEEP

      3072:P2T7uCWOhANdpgMxsdSyg4TvtcMk8Lyzb8ckivlu5KgiCbmN:PW7uCWOh4pl2GkGMkSgb8Svlu5KgON

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks