General

  • Target

    6ccb2248ecb871336a3e66d8728d27b6647306130b1952d7f8086874a6adcb60

  • Size

    28KB

  • Sample

    221107-3kv9qahahq

  • MD5

    92d71db5d7ecf727f7387fbd2f033b2c

  • SHA1

    c6332ddff92d799cd3e70da87d97cc9f16af9077

  • SHA256

    6ccb2248ecb871336a3e66d8728d27b6647306130b1952d7f8086874a6adcb60

  • SHA512

    ecf55a956f0b7522e9952c2d3819fcb83ac8890a04cb654881ad411f70aa806cd8cb8b78820a8a293aa38a8f73b20f8910a073290d173fe1532b88c725c13036

  • SSDEEP

    768:mPRjlBNB+BFBoBsB4BTBmBAC86oLjEMcaNoNl9/NOIj:chF/CF/5

Malware Config

Targets

    • Target

      6ccb2248ecb871336a3e66d8728d27b6647306130b1952d7f8086874a6adcb60

    • Size

      28KB

    • MD5

      92d71db5d7ecf727f7387fbd2f033b2c

    • SHA1

      c6332ddff92d799cd3e70da87d97cc9f16af9077

    • SHA256

      6ccb2248ecb871336a3e66d8728d27b6647306130b1952d7f8086874a6adcb60

    • SHA512

      ecf55a956f0b7522e9952c2d3819fcb83ac8890a04cb654881ad411f70aa806cd8cb8b78820a8a293aa38a8f73b20f8910a073290d173fe1532b88c725c13036

    • SSDEEP

      768:mPRjlBNB+BFBoBsB4BTBmBAC86oLjEMcaNoNl9/NOIj:chF/CF/5

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • UAC bypass

    • joker

      Joker is an Android malware that targets billing and SMS fraud.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v6

Tasks