General

  • Target

    c2e6877234c2edd75a5d8525adf13c8712a3f29c86adad2bc579c6b1749c8002

  • Size

    588KB

  • Sample

    220725-ah3xkaefg5

  • MD5

    4f542cd3e26d790abc538347a79b6f6e

  • SHA1

    e8dbe80515f81a24d2cebe637af05b30251d4db4

  • SHA256

    c2e6877234c2edd75a5d8525adf13c8712a3f29c86adad2bc579c6b1749c8002

  • SHA512

    01c91dacec7b0892839ccf2f2d5ea3b7b42464c3124c6bad4b6677cb87c01b71789aee0cb6ce80a22c30e3ade3a09c4e8dd7f9e1d07cb59a997112d31c8adf06

Malware Config

Targets

    • Target

      c2e6877234c2edd75a5d8525adf13c8712a3f29c86adad2bc579c6b1749c8002

    • Size

      588KB

    • MD5

      4f542cd3e26d790abc538347a79b6f6e

    • SHA1

      e8dbe80515f81a24d2cebe637af05b30251d4db4

    • SHA256

      c2e6877234c2edd75a5d8525adf13c8712a3f29c86adad2bc579c6b1749c8002

    • SHA512

      01c91dacec7b0892839ccf2f2d5ea3b7b42464c3124c6bad4b6677cb87c01b71789aee0cb6ce80a22c30e3ade3a09c4e8dd7f9e1d07cb59a997112d31c8adf06

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks