General

  • Target

    JaffaCakes118_603b93d3a8ca162e656d66116cdad792

  • Size

    185KB

  • Sample

    250310-t42fea1nt7

  • MD5

    603b93d3a8ca162e656d66116cdad792

  • SHA1

    7f62616012c36d6a1bd121e77869071239d72a87

  • SHA256

    5945103c45c1ed26f7e3274a8addb1ae95a12d4e88ae2e526714820a0b215218

  • SHA512

    9d80ddee599491735b0a7939088ea190d12a0ae150d1329e2f051ac05849fabca2d3fca017f630383f69a43791dc1d8a1efa55b8046c97e39718d7dab915d851

  • SSDEEP

    3072:DVa/B5BBu+bcxBbe+DJkHNDyya/B5BBu+bcxBbe+DJkHNDy1tyk:yr0bxFnDJ8+r0bxFnDJ8Qtb

Malware Config

Targets

    • Target

      JaffaCakes118_603b93d3a8ca162e656d66116cdad792

    • Size

      185KB

    • MD5

      603b93d3a8ca162e656d66116cdad792

    • SHA1

      7f62616012c36d6a1bd121e77869071239d72a87

    • SHA256

      5945103c45c1ed26f7e3274a8addb1ae95a12d4e88ae2e526714820a0b215218

    • SHA512

      9d80ddee599491735b0a7939088ea190d12a0ae150d1329e2f051ac05849fabca2d3fca017f630383f69a43791dc1d8a1efa55b8046c97e39718d7dab915d851

    • SSDEEP

      3072:DVa/B5BBu+bcxBbe+DJkHNDyya/B5BBu+bcxBbe+DJkHNDy1tyk:yr0bxFnDJ8+r0bxFnDJ8Qtb

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Server Software Component: Terminal Services DLL

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks