General
-
Target
JaffaCakes118_98e2a79530ee07c68cbe432e2cb64e94
-
Size
6.4MB
-
Sample
250330-tgdqtsvjt9
-
MD5
98e2a79530ee07c68cbe432e2cb64e94
-
SHA1
6951f4157bc92c8bcc5786dc173ad0fc829663b1
-
SHA256
2fc4ee66a3a833d7f32d5d16d5ef1e21ff5545462a3293b815c564b126606799
-
SHA512
02b6ca564be8865a606841d78db8dfc8830fdab0ec9205827053807ffa3f1295951499e675954a95236f022dd5406b5aee41e6567a614bdabbc1d0169fe1eb32
-
SSDEEP
196608:rqNHNXjeqHrj2a0cdhG1iYMOYRtfcx3wLi3tOMX6ckN9S:rqz9LSXcbG4OmY0i39XqNg
Behavioral task
behavioral1
Sample
西游网络.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
西游网络.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
LYdlq.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
LYdlq.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
lsass.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
lsass.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral7
Sample
.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
西游网络.exe
-
Size
6.4MB
-
MD5
736fc596bbb60dd0c8a89a7aeeb032e6
-
SHA1
76fcc1512ea6926f6e6fa418f4fe6b7573e9257e
-
SHA256
70e640b36104a6797f3df43616e57bcb951fc90515028964e94fa9934698cfc4
-
SHA512
9ad5d46cff24ac1010e66f4f2984d60add687fe4afecb58025021e9e4d861c40c9519eba1b5a11c1c810f9df93f1d5b4c19b83dc7961762eb0e6f36dda2f973c
-
SSDEEP
196608:3qNHNXjeqHrj2a0cdhG1iYMOYRtfcx3wLi3tOMX6ckN9h:3qz9LSXcbG4OmY0i39XqNj
Score3/10 -
-
-
Target
LYdlq.exe
-
Size
138KB
-
MD5
c7a8c4ebf18c5d5b4c06bdfdacd4c8f0
-
SHA1
d25db0d0a267dd753ce85ab27d23f11545852679
-
SHA256
7a21021900e30cfc62c447a8407301cd98f659e1b453b0070b2ee653279553c0
-
SHA512
a2093d2bdd09121b57dc1561cd8c55730353b81c8474d0676bf6f8ecf7f5f5725814f3fa45b6801eb967d52a957b53c7db1ba5e954abd94cfe4c55245b2dcaab
-
SSDEEP
3072:PW62gp7fl2fHrV3hUJ654M8v27qb02QxH21MUW:+ZMDl+rVwlMuy92QU2R
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Deletes itself
-
Executes dropped EXE
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
-
-
Target
lsass.exe
-
Size
125KB
-
MD5
1afb1f75153d736af51789988f9e83aa
-
SHA1
fabc13289ddce2ed0a851149feb1b7511c986b4c
-
SHA256
c52884d63cadf9dc9a8ff4b66a7bcdd426e5bbcecc0873c4f28488bba3428c2d
-
SHA512
bd9aa0ff6d64e35f56e6e9377f2812c4586b257a7582753abad25d99b24d6d77d4fbd36c7366a110fbbaa674326b3131b87914e7179fe2d9d64915b99b1d403f
-
SSDEEP
3072:RQhZkOLfuDg0PtOqzKONqsEykRLSDYpFweWt6HY:xOFStZzKqqsE6a/4
-
Gh0st RAT payload
-
Gh0strat family
-
-
-
Target
.exe
-
Size
6.4MB
-
MD5
b65bbb59533176ff10083328ddaa18c7
-
SHA1
9f870ba135c4244db068c0bff7f875e904e535f0
-
SHA256
e0decd5e242a276ca03092e53e28f0a5d01741bfa3ba33170f1e7fa417b35618
-
SHA512
8dcab4b6dccb736f1bd55b3406b1598efa37e90153c71fb896755df9d65cde27ffcb7f01d2ee47edf572cd1cf36945d92050fe437a663649393e4294a4d18766
-
SSDEEP
98304:rQTzteK9NvJiP2Zje8tNJj669cERHEkN+nCFAD7aSwIfeaG4u6r:M/te2vJiP288tUdkSCFADOQe56r
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1