General

  • Target

    f1033e36e4db16683f2df3a29cc2bf8eb53f9724d65f08f33f35c33ab8eeb60e

  • Size

    156KB

  • Sample

    221128-gcxa6aeb3y

  • MD5

    99dba6c31f76fe5a8adf6e116c82974e

  • SHA1

    f0175e066d3fba2939e1b89e14c79930e6880898

  • SHA256

    f1033e36e4db16683f2df3a29cc2bf8eb53f9724d65f08f33f35c33ab8eeb60e

  • SHA512

    e49ff414876401ab4f023752b901a27fd38de62ee133a72cdfd0129f20c4c538b279ada5736fd363fd14e59a71d4635de2e50fff6936fdbdfc995f734532df37

  • SSDEEP

    3072:PO+JlkeHRQFxJZWg/Dnq0iurbi6ZYYWYR5UtJ+c+aiQ:XlkeHR4ZVDPxVFWq5Ur+c+9Q

Malware Config

Targets

    • Target

      f1033e36e4db16683f2df3a29cc2bf8eb53f9724d65f08f33f35c33ab8eeb60e

    • Size

      156KB

    • MD5

      99dba6c31f76fe5a8adf6e116c82974e

    • SHA1

      f0175e066d3fba2939e1b89e14c79930e6880898

    • SHA256

      f1033e36e4db16683f2df3a29cc2bf8eb53f9724d65f08f33f35c33ab8eeb60e

    • SHA512

      e49ff414876401ab4f023752b901a27fd38de62ee133a72cdfd0129f20c4c538b279ada5736fd363fd14e59a71d4635de2e50fff6936fdbdfc995f734532df37

    • SSDEEP

      3072:PO+JlkeHRQFxJZWg/Dnq0iurbi6ZYYWYR5UtJ+c+aiQ:XlkeHR4ZVDPxVFWq5Ur+c+9Q

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets file execution options in registry

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks