General

  • Target

    7f91a01ff7e98f0475e6cecf03e7760162ba8979772c171cb21cfb619d457181

  • Size

    375KB

  • Sample

    220806-gkpw2sdga2

  • MD5

    bf01905b45b0b61fa62f73b9f3f54324

  • SHA1

    3d43b7f4a394621baf814e702110344ea0aa3a11

  • SHA256

    7f91a01ff7e98f0475e6cecf03e7760162ba8979772c171cb21cfb619d457181

  • SHA512

    9f52b816cb308a019993786b35a562e39342ae2d5b1d4fca2bf11907da1e7ccbbcbfc48d5596149567eaa50ec69fba658258a0551eda2bb105365f2de5d215a1

Score
10/10

Malware Config

Targets

    • Target

      7f91a01ff7e98f0475e6cecf03e7760162ba8979772c171cb21cfb619d457181

    • Size

      375KB

    • MD5

      bf01905b45b0b61fa62f73b9f3f54324

    • SHA1

      3d43b7f4a394621baf814e702110344ea0aa3a11

    • SHA256

      7f91a01ff7e98f0475e6cecf03e7760162ba8979772c171cb21cfb619d457181

    • SHA512

      9f52b816cb308a019993786b35a562e39342ae2d5b1d4fca2bf11907da1e7ccbbcbfc48d5596149567eaa50ec69fba658258a0551eda2bb105365f2de5d215a1

    Score
    10/10
    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks