General

  • Target

    JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951

  • Size

    777KB

  • Sample

    250309-2qptfstxhx

  • MD5

    5bad00590a2986a576d6fa47fe7c8951

  • SHA1

    b19978f61206fce13887a46eff565c32c3d93681

  • SHA256

    6a7c816b7dbcc0307915f3345bc00e3ba0a70dad7a5f2fea59bf0a685aa5f8f6

  • SHA512

    4b47be04d06958f5c7b4f3486dc32002ad39f8620d5aa626b3e58f4bec5df9f49d925048ce591833e18ae36f397fe61b54af6651cc50d75e38a77253a751123b

  • SSDEEP

    24576:BAxFc9euQ+pscajhLvElo2McbhjrbWI62FGy4+:GxFck5hgl/bhjrbW

Malware Config

Targets

    • Target

      JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951

    • Size

      777KB

    • MD5

      5bad00590a2986a576d6fa47fe7c8951

    • SHA1

      b19978f61206fce13887a46eff565c32c3d93681

    • SHA256

      6a7c816b7dbcc0307915f3345bc00e3ba0a70dad7a5f2fea59bf0a685aa5f8f6

    • SHA512

      4b47be04d06958f5c7b4f3486dc32002ad39f8620d5aa626b3e58f4bec5df9f49d925048ce591833e18ae36f397fe61b54af6651cc50d75e38a77253a751123b

    • SSDEEP

      24576:BAxFc9euQ+pscajhLvElo2McbhjrbWI62FGy4+:GxFck5hgl/bhjrbW

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks