General

  • Target

    96e219554988bdd68df233414aef40f669a84f3aadbc978eddbf647b880d0c13

  • Size

    172KB

  • Sample

    221125-h82fesec8y

  • MD5

    abd457f404c29c5a256f31efaeb3cb4d

  • SHA1

    dc183ff7f1a7ae60dd2e1eb077514a067375b0e1

  • SHA256

    96e219554988bdd68df233414aef40f669a84f3aadbc978eddbf647b880d0c13

  • SHA512

    be893db0a2822a2eb92673730eb64ad7af8a83219bd1f6b5fc024eda7d6dab943470f9c1a76f5b64927f3b5088c7ef622dd67bc1c5f7e21e69408a5450a08e60

  • SSDEEP

    3072:FZyAqSH/lSea50OcvB4oZ4O9BJ3+YcAAUNLsF8bYdDNMD4JBnhYN:Ty6lSJdSiI9ncAbLstDNPJdmN

Malware Config

Targets

    • Target

      96e219554988bdd68df233414aef40f669a84f3aadbc978eddbf647b880d0c13

    • Size

      172KB

    • MD5

      abd457f404c29c5a256f31efaeb3cb4d

    • SHA1

      dc183ff7f1a7ae60dd2e1eb077514a067375b0e1

    • SHA256

      96e219554988bdd68df233414aef40f669a84f3aadbc978eddbf647b880d0c13

    • SHA512

      be893db0a2822a2eb92673730eb64ad7af8a83219bd1f6b5fc024eda7d6dab943470f9c1a76f5b64927f3b5088c7ef622dd67bc1c5f7e21e69408a5450a08e60

    • SSDEEP

      3072:FZyAqSH/lSea50OcvB4oZ4O9BJ3+YcAAUNLsF8bYdDNMD4JBnhYN:Ty6lSJdSiI9ncAbLstDNPJdmN

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Sets file execution options in registry

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Tasks