General

  • Target

    4fc60f75b420041eef18cd7134b1785b112eeb3f8331fa05c655204a18436164

  • Size

    652KB

  • Sample

    220719-zfhlaacbe6

  • MD5

    54391783e53e77d358ae3fa2387133ff

  • SHA1

    87e60f6aac8b0dec67c2b6390da2427bff83d94f

  • SHA256

    4fc60f75b420041eef18cd7134b1785b112eeb3f8331fa05c655204a18436164

  • SHA512

    f841c254c6a0dca8fcf4a5efa16882bfe32a5184d3489480234683448a67a4a6cfa3cf409094613d7c5ce69d4ce182ab5c16059eab9e318e93a49636fc4f2fa0

Malware Config

Targets

    • Target

      4fc60f75b420041eef18cd7134b1785b112eeb3f8331fa05c655204a18436164

    • Size

      652KB

    • MD5

      54391783e53e77d358ae3fa2387133ff

    • SHA1

      87e60f6aac8b0dec67c2b6390da2427bff83d94f

    • SHA256

      4fc60f75b420041eef18cd7134b1785b112eeb3f8331fa05c655204a18436164

    • SHA512

      f841c254c6a0dca8fcf4a5efa16882bfe32a5184d3489480234683448a67a4a6cfa3cf409094613d7c5ce69d4ce182ab5c16059eab9e318e93a49636fc4f2fa0

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Tasks