General

  • Target

    19f22811c7d9d8abb70dd9a1e81fd4836802687c0f37b5b5b0189be3c37cf1ee

  • Size

    152KB

  • Sample

    221128-g8xa2acc79

  • MD5

    18d79e48f4a53fd03da55cab229c0960

  • SHA1

    5369878ae807b98073ffdb7a4eaea05d2a824198

  • SHA256

    19f22811c7d9d8abb70dd9a1e81fd4836802687c0f37b5b5b0189be3c37cf1ee

  • SHA512

    ef226bd3e81cdd028d12e155fb51045c2cd435ba1c05ea8dab880a7f55dc66f0da571a37da5795bd1830186469a205f9bdae570630b830b663a0c37b8f4effdc

  • SSDEEP

    3072:LwF8T0PAmr9B4NgVjGt1rOikGML7oCmFZKnbmLLLUa:8FCqxB4Ng9GLjcoCmFJLXUa

Malware Config

Targets

    • Target

      19f22811c7d9d8abb70dd9a1e81fd4836802687c0f37b5b5b0189be3c37cf1ee

    • Size

      152KB

    • MD5

      18d79e48f4a53fd03da55cab229c0960

    • SHA1

      5369878ae807b98073ffdb7a4eaea05d2a824198

    • SHA256

      19f22811c7d9d8abb70dd9a1e81fd4836802687c0f37b5b5b0189be3c37cf1ee

    • SHA512

      ef226bd3e81cdd028d12e155fb51045c2cd435ba1c05ea8dab880a7f55dc66f0da571a37da5795bd1830186469a205f9bdae570630b830b663a0c37b8f4effdc

    • SSDEEP

      3072:LwF8T0PAmr9B4NgVjGt1rOikGML7oCmFZKnbmLLLUa:8FCqxB4Ng9GLjcoCmFJLXUa

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets file execution options in registry

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks