General

  • Target

    546a5c07772d7dd3d884e6042efb3fd18034f0f81ce8b9e8dd0dd9d867b211ce

  • Size

    375KB

  • Sample

    220911-tyt45sbhg5

  • MD5

    9d7e7fde20f5710664606ccdd399f4e9

  • SHA1

    88f3280f5341220a7e76a3f5f30060e36cf14e6f

  • SHA256

    546a5c07772d7dd3d884e6042efb3fd18034f0f81ce8b9e8dd0dd9d867b211ce

  • SHA512

    b1835f491a74d96c6e4d41397368bd38a78411ddfc59377067724c861b8c286da82d9e7299ab392eb317f5a4bdce5fd825b1d247e0a1258e026941e7af03eb57

  • SSDEEP

    6144:Ev5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:E4VOiF1WD7kE1dTYOi8V5u23zmWFy4

Score
10/10

Malware Config

Targets

    • Target

      546a5c07772d7dd3d884e6042efb3fd18034f0f81ce8b9e8dd0dd9d867b211ce

    • Size

      375KB

    • MD5

      9d7e7fde20f5710664606ccdd399f4e9

    • SHA1

      88f3280f5341220a7e76a3f5f30060e36cf14e6f

    • SHA256

      546a5c07772d7dd3d884e6042efb3fd18034f0f81ce8b9e8dd0dd9d867b211ce

    • SHA512

      b1835f491a74d96c6e4d41397368bd38a78411ddfc59377067724c861b8c286da82d9e7299ab392eb317f5a4bdce5fd825b1d247e0a1258e026941e7af03eb57

    • SSDEEP

      6144:Ev5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:E4VOiF1WD7kE1dTYOi8V5u23zmWFy4

    Score
    10/10
    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks