General

  • Target

    JaffaCakes118_5edf022b564d50bfd6a02a2de6745dad

  • Size

    105KB

  • Sample

    250310-nnhepss1c1

  • MD5

    5edf022b564d50bfd6a02a2de6745dad

  • SHA1

    bce03b27545331c68c75959e33cd587b4193c14b

  • SHA256

    522a61b98d71853bf653510da30f2b4ad437d0ff22a393172bac6d7eb6e91a8e

  • SHA512

    8373e6b5c69aa1ca582b6ce6056af9e12685bde7e25cecc7140db066422294d61e19c1db69cd927fcfbadc431ca62480b32b26e5bccfb9619f669980b7d159bf

  • SSDEEP

    3072:F8G6SyGxDPgaiT/t0nijg1DBIM9SlWATw+DkUhcUEdWK:+lSyGtorT/10DC2SlWAw+gUhbSF

Malware Config

Targets

    • Target

      JaffaCakes118_5edf022b564d50bfd6a02a2de6745dad

    • Size

      105KB

    • MD5

      5edf022b564d50bfd6a02a2de6745dad

    • SHA1

      bce03b27545331c68c75959e33cd587b4193c14b

    • SHA256

      522a61b98d71853bf653510da30f2b4ad437d0ff22a393172bac6d7eb6e91a8e

    • SHA512

      8373e6b5c69aa1ca582b6ce6056af9e12685bde7e25cecc7140db066422294d61e19c1db69cd927fcfbadc431ca62480b32b26e5bccfb9619f669980b7d159bf

    • SSDEEP

      3072:F8G6SyGxDPgaiT/t0nijg1DBIM9SlWATw+DkUhcUEdWK:+lSyGtorT/10DC2SlWAw+gUhbSF

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Server Software Component: Terminal Services DLL

    • Deletes itself

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks