General

  • Target

    d61cd9ba464b13d4a8a2710d3fa24a30532520311373e65caffd7b7862a5f1be

  • Size

    767KB

  • Sample

    221123-z5vbdaee64

  • MD5

    5e56b372b31ae8003718eab35b760da0

  • SHA1

    b71ecff2cdd0fc8bb0994d217a493f87047dea53

  • SHA256

    d61cd9ba464b13d4a8a2710d3fa24a30532520311373e65caffd7b7862a5f1be

  • SHA512

    f432364c3092ce9801369b0e5b65a6ae7135520ecf74f227c08fbd3da45563b8f55f6014c3b245381c2df38868a22fe8608f54179fb7da00bce02f71b63e2ec9

  • SSDEEP

    12288:NMvnmkz220hLf1Trc9j+g3tMHzpgO5163YpqclmZfiIxrO+SHUpsTGpi0nXfs87f:Wvmc2fhJWSg3tOzpgO16IUclhI4Icb0+

Malware Config

Targets

    • Target

      d61cd9ba464b13d4a8a2710d3fa24a30532520311373e65caffd7b7862a5f1be

    • Size

      767KB

    • MD5

      5e56b372b31ae8003718eab35b760da0

    • SHA1

      b71ecff2cdd0fc8bb0994d217a493f87047dea53

    • SHA256

      d61cd9ba464b13d4a8a2710d3fa24a30532520311373e65caffd7b7862a5f1be

    • SHA512

      f432364c3092ce9801369b0e5b65a6ae7135520ecf74f227c08fbd3da45563b8f55f6014c3b245381c2df38868a22fe8608f54179fb7da00bce02f71b63e2ec9

    • SSDEEP

      12288:NMvnmkz220hLf1Trc9j+g3tMHzpgO5163YpqclmZfiIxrO+SHUpsTGpi0nXfs87f:Wvmc2fhJWSg3tOzpgO16IUclhI4Icb0+

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Modifies Installed Components in the registry

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

1
T1012

Virtualization/Sandbox Evasion

1
T1497

Tasks