General

  • Target

    WhatsApp.exe

  • Size

    125.9MB

  • Sample

    221123-grmehada57

  • MD5

    b08f87a129d8ba46118db20d60a63774

  • SHA1

    a6085e9a60d9231dc912e3b58ef59233a180cec9

  • SHA256

    0a0e8adfebfd5c9afce928317436c55a76899784a27732ca85c8ee3770958f04

  • SHA512

    49334580207309b49c583064aa27676076f94bf1499bf47cc5b2ecd794f9fd979d60e9db4d2bcfd007db2dcdf7ca4546f374b390a0544cae2ec8e87584a5f90f

  • SSDEEP

    3145728:fWHvJqjZrei7ilhjNRR87Z95jCyK7n3tO29oHhD1Im9FzkuQ:SmZreieZRRGbWylBD1x9Zy

Malware Config

Targets

    • Target

      WhatsApp.exe

    • Size

      125.9MB

    • MD5

      b08f87a129d8ba46118db20d60a63774

    • SHA1

      a6085e9a60d9231dc912e3b58ef59233a180cec9

    • SHA256

      0a0e8adfebfd5c9afce928317436c55a76899784a27732ca85c8ee3770958f04

    • SHA512

      49334580207309b49c583064aa27676076f94bf1499bf47cc5b2ecd794f9fd979d60e9db4d2bcfd007db2dcdf7ca4546f374b390a0544cae2ec8e87584a5f90f

    • SSDEEP

      3145728:fWHvJqjZrei7ilhjNRR87Z95jCyK7n3tO29oHhD1Im9FzkuQ:SmZreieZRRGbWylBD1x9Zy

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • UAC bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks