General

  • Target

    8d64aff2b644ac993389c1ad1ec2b47c459c63ddd7f5815ea353a49014ed4a99

  • Size

    177KB

  • Sample

    221124-2cxl5sgc7v

  • MD5

    d2e188657a3a3706547636099ee91e4b

  • SHA1

    a900f8472495d7ebf0c718ad6e555d7bda4e04a6

  • SHA256

    8d64aff2b644ac993389c1ad1ec2b47c459c63ddd7f5815ea353a49014ed4a99

  • SHA512

    1ee1efc7c74c2a75870e5d16cb4220e4f6113aafd24ce9ad9104b02909a499c5a3d34e93d897d71a9ddfce2238b2c4666b5b442d661944bb03cf072d592d2460

  • SSDEEP

    3072:ezZCwyESXpbo6aywuxuWuHZQEIplVwE7T2f46S7O+FI7aICpsX:cyLs6ayFus7j7i

Malware Config

Targets

    • Target

      8d64aff2b644ac993389c1ad1ec2b47c459c63ddd7f5815ea353a49014ed4a99

    • Size

      177KB

    • MD5

      d2e188657a3a3706547636099ee91e4b

    • SHA1

      a900f8472495d7ebf0c718ad6e555d7bda4e04a6

    • SHA256

      8d64aff2b644ac993389c1ad1ec2b47c459c63ddd7f5815ea353a49014ed4a99

    • SHA512

      1ee1efc7c74c2a75870e5d16cb4220e4f6113aafd24ce9ad9104b02909a499c5a3d34e93d897d71a9ddfce2238b2c4666b5b442d661944bb03cf072d592d2460

    • SSDEEP

      3072:ezZCwyESXpbo6aywuxuWuHZQEIplVwE7T2f46S7O+FI7aICpsX:cyLs6ayFus7j7i

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Sets file execution options in registry

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks