General

  • Target

    f38acdac6bca307674f1329c73c00704080fa444f331c73cbb775ea81e646581

  • Size

    107KB

  • Sample

    221124-btzjyshh56

  • MD5

    0852e655acfacb658792174480ee42f0

  • SHA1

    12236c070bd5b38f2271ac8ff7240e0e347783c1

  • SHA256

    f38acdac6bca307674f1329c73c00704080fa444f331c73cbb775ea81e646581

  • SHA512

    f967a9d9128d1f2cc8a38b986d10ac5605690de3b01139446ff41badff4ee80dea94f59f6e234f2cbe578e55373e8439542608bd78eaf697df0c746404c7b941

  • SSDEEP

    3072:IFz90hq+Yc7Hf4oa5r5sojsj+oMep6Gm1j:Inycc7/4D95sqBFm6GmN

Malware Config

Targets

    • Target

      f38acdac6bca307674f1329c73c00704080fa444f331c73cbb775ea81e646581

    • Size

      107KB

    • MD5

      0852e655acfacb658792174480ee42f0

    • SHA1

      12236c070bd5b38f2271ac8ff7240e0e347783c1

    • SHA256

      f38acdac6bca307674f1329c73c00704080fa444f331c73cbb775ea81e646581

    • SHA512

      f967a9d9128d1f2cc8a38b986d10ac5605690de3b01139446ff41badff4ee80dea94f59f6e234f2cbe578e55373e8439542608bd78eaf697df0c746404c7b941

    • SSDEEP

      3072:IFz90hq+Yc7Hf4oa5r5sojsj+oMep6Gm1j:Inycc7/4D95sqBFm6GmN

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Modifies firewall policy service

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks