General

  • Target

    3ac2db60f3c05f6d40d6e6b39cc3bf29d9fc30333c3a0f1826b00413cbe9cd45

  • Size

    375KB

  • Sample

    220916-q29gfsbfdn

  • MD5

    1914bb8e06917d094cc28a49858adc13

  • SHA1

    a123e3874a7167f9d0a045e05c2b47c755c142b5

  • SHA256

    3ac2db60f3c05f6d40d6e6b39cc3bf29d9fc30333c3a0f1826b00413cbe9cd45

  • SHA512

    8445d5781490e02267a8ba07425b7c41b049d6a66f36f1190d2b064cfe50907c89b0ee1767dd3753cbcc6d4401ba794e5aa87fa72ced1a6d2564aba2156a0877

  • SSDEEP

    6144:3v5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:34VOiF1WD7kE1dTYOi8V5u23zmWFy4

Score
10/10

Malware Config

Targets

    • Target

      3ac2db60f3c05f6d40d6e6b39cc3bf29d9fc30333c3a0f1826b00413cbe9cd45

    • Size

      375KB

    • MD5

      1914bb8e06917d094cc28a49858adc13

    • SHA1

      a123e3874a7167f9d0a045e05c2b47c755c142b5

    • SHA256

      3ac2db60f3c05f6d40d6e6b39cc3bf29d9fc30333c3a0f1826b00413cbe9cd45

    • SHA512

      8445d5781490e02267a8ba07425b7c41b049d6a66f36f1190d2b064cfe50907c89b0ee1767dd3753cbcc6d4401ba794e5aa87fa72ced1a6d2564aba2156a0877

    • SSDEEP

      6144:3v5zQJVb5p72cHF1ybDFwekh212KhvwIb759QOaBjpaVRPu23E2rJmWjFc94:34VOiF1WD7kE1dTYOi8V5u23zmWFy4

    Score
    10/10
    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks