General

  • Target

    517c57c3996f8aef1df04fac777082b78771476c627849898f4a435d0e540278

  • Size

    375KB

  • Sample

    220806-jclwjaeee9

  • MD5

    c51d0fdd78ca5e509f20769db737486b

  • SHA1

    fb98116951beb903e34955e566b16ee3f53ef419

  • SHA256

    517c57c3996f8aef1df04fac777082b78771476c627849898f4a435d0e540278

  • SHA512

    3cf0251c49e24417bc7e8554c1e6a3bf3dda9a35c7a610437c409fa5348379b5839ef65ebf6192d73652d787eef1e105e43db991b8fe5e87e841b7268613e7ec

Score
10/10

Malware Config

Targets

    • Target

      517c57c3996f8aef1df04fac777082b78771476c627849898f4a435d0e540278

    • Size

      375KB

    • MD5

      c51d0fdd78ca5e509f20769db737486b

    • SHA1

      fb98116951beb903e34955e566b16ee3f53ef419

    • SHA256

      517c57c3996f8aef1df04fac777082b78771476c627849898f4a435d0e540278

    • SHA512

      3cf0251c49e24417bc7e8554c1e6a3bf3dda9a35c7a610437c409fa5348379b5839ef65ebf6192d73652d787eef1e105e43db991b8fe5e87e841b7268613e7ec

    Score
    10/10
    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks