General

  • Target

    438b53cc3fba2ff517feb57cd7b3e54e7c6f30561f1c0359f0cff9d40f870102

  • Size

    375KB

  • Sample

    220812-vgwgbahhh9

  • MD5

    6268ecec8e51376dedbc09b0492cd625

  • SHA1

    a5cab20edbc80b6da25f5a9949490b9f42ccd492

  • SHA256

    438b53cc3fba2ff517feb57cd7b3e54e7c6f30561f1c0359f0cff9d40f870102

  • SHA512

    bf5bcf6d2c105d5b3ff920f14bee2ab73ed76457c0ff9265952947d65d8481794eb216311e5769f4e68c1ba1b66cf2391a91bfccb2c5a624116974d1b5de5c57

Score
10/10

Malware Config

Targets

    • Target

      438b53cc3fba2ff517feb57cd7b3e54e7c6f30561f1c0359f0cff9d40f870102

    • Size

      375KB

    • MD5

      6268ecec8e51376dedbc09b0492cd625

    • SHA1

      a5cab20edbc80b6da25f5a9949490b9f42ccd492

    • SHA256

      438b53cc3fba2ff517feb57cd7b3e54e7c6f30561f1c0359f0cff9d40f870102

    • SHA512

      bf5bcf6d2c105d5b3ff920f14bee2ab73ed76457c0ff9265952947d65d8481794eb216311e5769f4e68c1ba1b66cf2391a91bfccb2c5a624116974d1b5de5c57

    Score
    10/10
    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks