General

  • Size

    375KB

  • Sample

    220923-g6vdnahcfn

  • MD5

    697453602ee8b3699d9dd33a450f5d90

  • SHA1

    c66310cbade6e54558995280b3a4244110075d50

  • SHA256

    d89d1f224bc9be39a7aee173f941f64e79d9570d875209b7b4be1d578b3d1def

  • SHA512

    eabc55fba7f260a385feebe2a66fa41943150b9927c083962e5dfc924cdfd5db24695b9e2e051ea408a5009c87ce033fc57af41a05d8a25e2aaa785f1986dac2

Score
10/10

Malware Config

Targets

    • Target

      d89d1f224bc9be39a7aee173f941f64e79d9570d875209b7b4be1d578b3d1def

    • Size

      375KB

    • MD5

      697453602ee8b3699d9dd33a450f5d90

    • SHA1

      c66310cbade6e54558995280b3a4244110075d50

    • SHA256

      d89d1f224bc9be39a7aee173f941f64e79d9570d875209b7b4be1d578b3d1def

    • SHA512

      eabc55fba7f260a385feebe2a66fa41943150b9927c083962e5dfc924cdfd5db24695b9e2e051ea408a5009c87ce033fc57af41a05d8a25e2aaa785f1986dac2

    Score
    10/10
    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

          Execution

            Exfiltration

              Impact

                Initial Access

                  Lateral Movement

                    Persistence

                      Privilege Escalation