General

  • Target

    e2a3871677a632066f9730979dca75a5aa480ed153079faa6063c42d65074161

  • Size

    187KB

  • Sample

    221125-hphtzahd46

  • MD5

    303a93c05b3fb175e684485de74b0eab

  • SHA1

    3a29dc17933c90bf974953c29a999f638c765539

  • SHA256

    e2a3871677a632066f9730979dca75a5aa480ed153079faa6063c42d65074161

  • SHA512

    710c4b82ba4fc8a05684365fbca49c25ee1db65695e1de449b370f502fc947d2447e2a5991d65adbb92213ed206517f6c1f78d5765b401bc9ae0f3a5422f9964

  • SSDEEP

    3072:htQ5AxaRsexh7awpEPk7m9CW0Yx77zi8hoTxWQYeFYTPmHOPqA5ostZVRY:vKAxauMh7awpEPk7m70Yt7zimoTxpYhy

Malware Config

Targets

    • Target

      e2a3871677a632066f9730979dca75a5aa480ed153079faa6063c42d65074161

    • Size

      187KB

    • MD5

      303a93c05b3fb175e684485de74b0eab

    • SHA1

      3a29dc17933c90bf974953c29a999f638c765539

    • SHA256

      e2a3871677a632066f9730979dca75a5aa480ed153079faa6063c42d65074161

    • SHA512

      710c4b82ba4fc8a05684365fbca49c25ee1db65695e1de449b370f502fc947d2447e2a5991d65adbb92213ed206517f6c1f78d5765b401bc9ae0f3a5422f9964

    • SSDEEP

      3072:htQ5AxaRsexh7awpEPk7m9CW0Yx77zi8hoTxWQYeFYTPmHOPqA5ostZVRY:vKAxauMh7awpEPk7m70Yt7zimoTxpYhy

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Sets file execution options in registry

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Tasks