General

  • Target

    ed5d358d76ee99bad0e155e8e0066056516e9af0d91ad2a8fbcde34018388ee1

  • Size

    375KB

  • Sample

    220806-jhzpkscbhk

  • MD5

    d93ccafdc9d378746f0863117d222f11

  • SHA1

    5ac6ee620ac639764886a17fcda4cc9d8a505869

  • SHA256

    ed5d358d76ee99bad0e155e8e0066056516e9af0d91ad2a8fbcde34018388ee1

  • SHA512

    16b12def2916196987990467cf0bea691fe92cef0af8c6fb38ef6bd880a5cf683fd1906c67c06885ae40d3b686c10e5b4da9f498a4bd0bc4cdfcf801ed799cc8

Score
10/10

Malware Config

Targets

    • Target

      ed5d358d76ee99bad0e155e8e0066056516e9af0d91ad2a8fbcde34018388ee1

    • Size

      375KB

    • MD5

      d93ccafdc9d378746f0863117d222f11

    • SHA1

      5ac6ee620ac639764886a17fcda4cc9d8a505869

    • SHA256

      ed5d358d76ee99bad0e155e8e0066056516e9af0d91ad2a8fbcde34018388ee1

    • SHA512

      16b12def2916196987990467cf0bea691fe92cef0af8c6fb38ef6bd880a5cf683fd1906c67c06885ae40d3b686c10e5b4da9f498a4bd0bc4cdfcf801ed799cc8

    Score
    10/10
    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks