General

  • Target

    78b8310b9df32e78f9bbf7d47e15b0efa215c7facee2389d8d6922b4156a1aa0

  • Size

    188KB

  • Sample

    221002-qctppshfdl

  • MD5

    713fb09d70d90d60d1d49ce353fe05b0

  • SHA1

    797c04a9ddc7579728bc6087bcdc44215bb84882

  • SHA256

    78b8310b9df32e78f9bbf7d47e15b0efa215c7facee2389d8d6922b4156a1aa0

  • SHA512

    434eac53e47525f5fa486dd1206895701b2eb58981c907f1aca444536a897e141e7adfb2ee3a493682af55a06dd7859faf95ab74fbac0309cf9eb6bf0eef0982

  • SSDEEP

    3072:GTQa1nW7nA+J+KhHtoyviMmrhplCQuM359VgrzjKr+YHd:QVnW7XUSHtoyiMmdCQdVg2r+Y

Malware Config

Targets

    • Target

      78b8310b9df32e78f9bbf7d47e15b0efa215c7facee2389d8d6922b4156a1aa0

    • Size

      188KB

    • MD5

      713fb09d70d90d60d1d49ce353fe05b0

    • SHA1

      797c04a9ddc7579728bc6087bcdc44215bb84882

    • SHA256

      78b8310b9df32e78f9bbf7d47e15b0efa215c7facee2389d8d6922b4156a1aa0

    • SHA512

      434eac53e47525f5fa486dd1206895701b2eb58981c907f1aca444536a897e141e7adfb2ee3a493682af55a06dd7859faf95ab74fbac0309cf9eb6bf0eef0982

    • SSDEEP

      3072:GTQa1nW7nA+J+KhHtoyviMmrhplCQuM359VgrzjKr+YHd:QVnW7XUSHtoyiMmdCQdVg2r+Y

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Deletes itself

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks