General

  • Target

    aee781b862d9d6727982d3757fad4bb1bc2f3f0cd3df4c8997cb92a51c642af5

  • Size

    107KB

  • Sample

    221014-m2ckyacbe9

  • MD5

    460944f39dbfb5a0ba6e970ff38b7f70

  • SHA1

    0dc8f066ea95aad962d85dcc8117e7484a43aeab

  • SHA256

    aee781b862d9d6727982d3757fad4bb1bc2f3f0cd3df4c8997cb92a51c642af5

  • SHA512

    5cbbfea8bed2ef49b40ed58caf65f41ec1d2cb60b211c92624bf5633daaf3782fc728e64ace6feaa712fe61dffea942747b00e3cd1f232bec865836e4d466fb0

  • SSDEEP

    3072:4FF90hq+Yc7Hf4oa5r5sojsj+oMy+FO/PqYY:49ycc7/4D95sqBFoP

Malware Config

Targets

    • Target

      aee781b862d9d6727982d3757fad4bb1bc2f3f0cd3df4c8997cb92a51c642af5

    • Size

      107KB

    • MD5

      460944f39dbfb5a0ba6e970ff38b7f70

    • SHA1

      0dc8f066ea95aad962d85dcc8117e7484a43aeab

    • SHA256

      aee781b862d9d6727982d3757fad4bb1bc2f3f0cd3df4c8997cb92a51c642af5

    • SHA512

      5cbbfea8bed2ef49b40ed58caf65f41ec1d2cb60b211c92624bf5633daaf3782fc728e64ace6feaa712fe61dffea942747b00e3cd1f232bec865836e4d466fb0

    • SSDEEP

      3072:4FF90hq+Yc7Hf4oa5r5sojsj+oMy+FO/PqYY:49ycc7/4D95sqBFoP

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Modifies firewall policy service

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks