General

  • Target

    56bb13a4a573793f62d3740f08f8dedb133dac10d67957c1bbbde43cef165f23

  • Size

    36KB

  • Sample

    220725-k684labgfq

  • MD5

    a51da44302e62efe00eed42d9b570622

  • SHA1

    a76b15753a853e6a222d301d88eb60e92479f2f1

  • SHA256

    56bb13a4a573793f62d3740f08f8dedb133dac10d67957c1bbbde43cef165f23

  • SHA512

    b90b471965ab16e7167928c45266b07a8139cdecebbaed16566c48bbb7d484e8b955fb744bb3322f0d5f300ab8e59e5569525cda67a75e9466338cd4f0e79d43

Score
10/10

Malware Config

Targets

    • Target

      56bb13a4a573793f62d3740f08f8dedb133dac10d67957c1bbbde43cef165f23

    • Size

      36KB

    • MD5

      a51da44302e62efe00eed42d9b570622

    • SHA1

      a76b15753a853e6a222d301d88eb60e92479f2f1

    • SHA256

      56bb13a4a573793f62d3740f08f8dedb133dac10d67957c1bbbde43cef165f23

    • SHA512

      b90b471965ab16e7167928c45266b07a8139cdecebbaed16566c48bbb7d484e8b955fb744bb3322f0d5f300ab8e59e5569525cda67a75e9466338cd4f0e79d43

    Score
    10/10
    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • suricata: ET MALWARE PCRat/Gh0st CnC Beacon Request (Xfire variant)

      suricata: ET MALWARE PCRat/Gh0st CnC Beacon Request (Xfire variant)

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks