General

  • Target

    JaffaCakes118_569950bac39e02139f59232e4342bd72

  • Size

    338KB

  • Sample

    250306-q6hvasztex

  • MD5

    569950bac39e02139f59232e4342bd72

  • SHA1

    5fe8348ba8e33832c1d32c440ce6bcd5ca2d81a3

  • SHA256

    2eaffee2df904fe4f9e8275adba88b6b9c79833cd1c56f2efd730e49994ea3c1

  • SHA512

    2ab32d6807279921fd2c3f73d3dd7ed92fd1bdb1823c89e8065c7934b224e613daf7f82f39f457708c7f7ce7dd905f0166c16dfb61ca7d5d009ad857af3a0483

  • SSDEEP

    6144:kDOKu03Vjuy4nDWgRAkPf2GQn8xID0DMFChkYkYZeTx1xirVOK/Apf8bZ9oWOQ:8ju0FKvR3Pf2GLxe0Dv7jZw1ucEN9oZQ

Malware Config

Targets

    • Target

      JaffaCakes118_569950bac39e02139f59232e4342bd72

    • Size

      338KB

    • MD5

      569950bac39e02139f59232e4342bd72

    • SHA1

      5fe8348ba8e33832c1d32c440ce6bcd5ca2d81a3

    • SHA256

      2eaffee2df904fe4f9e8275adba88b6b9c79833cd1c56f2efd730e49994ea3c1

    • SHA512

      2ab32d6807279921fd2c3f73d3dd7ed92fd1bdb1823c89e8065c7934b224e613daf7f82f39f457708c7f7ce7dd905f0166c16dfb61ca7d5d009ad857af3a0483

    • SSDEEP

      6144:kDOKu03Vjuy4nDWgRAkPf2GQn8xID0DMFChkYkYZeTx1xirVOK/Apf8bZ9oWOQ:8ju0FKvR3Pf2GLxe0Dv7jZw1ucEN9oZQ

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks