General

  • Target

    JaffaCakes118_5e588ad8c6ff29d68d8c4b2703e84305

  • Size

    356KB

  • Sample

    250310-lh2kaazpy4

  • MD5

    5e588ad8c6ff29d68d8c4b2703e84305

  • SHA1

    c10c36a2373caabed301b66e76f897fd846859b8

  • SHA256

    14310d2c264e4e9eb0dc14874b9b92e8de298dca47e3ad4c4dee8e2d51312a0b

  • SHA512

    ee4fd09a608571e1cdeeabad10995e578013f6c479f56ae7d7885ca027a1a44bca8d35f76f6f45acdb6d80b4bd0f782a5baf45e8e939d449c694a3917f814547

  • SSDEEP

    6144:ghru3c9FNN8tyEH96wgvRHCzOYtqlGyzcsX3KA0LQIQRV:eruM9FNatyO3gNCpOdn/u2

Malware Config

Targets

    • Target

      JaffaCakes118_5e588ad8c6ff29d68d8c4b2703e84305

    • Size

      356KB

    • MD5

      5e588ad8c6ff29d68d8c4b2703e84305

    • SHA1

      c10c36a2373caabed301b66e76f897fd846859b8

    • SHA256

      14310d2c264e4e9eb0dc14874b9b92e8de298dca47e3ad4c4dee8e2d51312a0b

    • SHA512

      ee4fd09a608571e1cdeeabad10995e578013f6c479f56ae7d7885ca027a1a44bca8d35f76f6f45acdb6d80b4bd0f782a5baf45e8e939d449c694a3917f814547

    • SSDEEP

      6144:ghru3c9FNN8tyEH96wgvRHCzOYtqlGyzcsX3KA0LQIQRV:eruM9FNatyO3gNCpOdn/u2

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks