General

  • Target

    02d5a19dc879f4c12a184fbea0272b5e3b68425a4797900c662e5c535b10eb1e

  • Size

    960KB

  • Sample

    221124-e68j6she28

  • MD5

    d57075473f47527e120aadd97c041fc3

  • SHA1

    8c2f7ef3bffe4eaad1a7dd3d9e281762afb4f975

  • SHA256

    02d5a19dc879f4c12a184fbea0272b5e3b68425a4797900c662e5c535b10eb1e

  • SHA512

    e4a8ddd313e4d86422d80b347122f61b39c54a518849e5f70b0243a536d1991f5fea7c8e0c734816726abb26087a7b44fd06d734d84a1d5f02a3e44899e5ff1e

  • SSDEEP

    24576:bDZqBmKrshiiLSZcOKiAtrgH/Yflt4S+n:bsZrshiHZcDltrs/ult4t

Malware Config

Targets

    • Target

      02d5a19dc879f4c12a184fbea0272b5e3b68425a4797900c662e5c535b10eb1e

    • Size

      960KB

    • MD5

      d57075473f47527e120aadd97c041fc3

    • SHA1

      8c2f7ef3bffe4eaad1a7dd3d9e281762afb4f975

    • SHA256

      02d5a19dc879f4c12a184fbea0272b5e3b68425a4797900c662e5c535b10eb1e

    • SHA512

      e4a8ddd313e4d86422d80b347122f61b39c54a518849e5f70b0243a536d1991f5fea7c8e0c734816726abb26087a7b44fd06d734d84a1d5f02a3e44899e5ff1e

    • SSDEEP

      24576:bDZqBmKrshiiLSZcOKiAtrgH/Yflt4S+n:bsZrshiHZcDltrs/ult4t

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks