General

  • Target

    aefc40ddeee9be5ef410656860ceb6f658c2942f81b45ac18160503fe3fda604

  • Size

    375KB

  • Sample

    220806-ha9n5seaf6

  • MD5

    516260e52d47f6df81c10d7d3bd5ce77

  • SHA1

    ac39c58c8ce214f2056081ceb9e07507e2eb62e5

  • SHA256

    aefc40ddeee9be5ef410656860ceb6f658c2942f81b45ac18160503fe3fda604

  • SHA512

    f0592d32e3241b6210c32e9b22df37695256f7a364cc39c56b674d2d9313547b1b3cf144a4da675c361f1fc6551dd5344f3e259bed68c55e1978d44f687e6340

Score
10/10

Malware Config

Targets

    • Target

      aefc40ddeee9be5ef410656860ceb6f658c2942f81b45ac18160503fe3fda604

    • Size

      375KB

    • MD5

      516260e52d47f6df81c10d7d3bd5ce77

    • SHA1

      ac39c58c8ce214f2056081ceb9e07507e2eb62e5

    • SHA256

      aefc40ddeee9be5ef410656860ceb6f658c2942f81b45ac18160503fe3fda604

    • SHA512

      f0592d32e3241b6210c32e9b22df37695256f7a364cc39c56b674d2d9313547b1b3cf144a4da675c361f1fc6551dd5344f3e259bed68c55e1978d44f687e6340

    Score
    10/10
    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks