General

  • Target

    d6a2db165f95e5fcae805d0fb2ffca85444fab396c3fadeaefc4421b459f4504

  • Size

    152KB

  • Sample

    221128-getytaec7y

  • MD5

    29df0df20067c5619bb71402989c9806

  • SHA1

    e1a22cafc82f478bea576d609ef9f25141aa59e7

  • SHA256

    d6a2db165f95e5fcae805d0fb2ffca85444fab396c3fadeaefc4421b459f4504

  • SHA512

    4cda78987dab3668f0adb1d351102d35a0b3092db46aafcd113612cf96945e64a3bfeb1d92eed91e442d51eeb6567bdf81086461cf1fb9342b364d7101d3fe8a

  • SSDEEP

    3072:LwF8T0PAmr9B4NgVjGt1rOikGML7oCmFZKnbmLLLU7:8FCqxB4Ng9GLjcoCmFJLXU7

Malware Config

Targets

    • Target

      d6a2db165f95e5fcae805d0fb2ffca85444fab396c3fadeaefc4421b459f4504

    • Size

      152KB

    • MD5

      29df0df20067c5619bb71402989c9806

    • SHA1

      e1a22cafc82f478bea576d609ef9f25141aa59e7

    • SHA256

      d6a2db165f95e5fcae805d0fb2ffca85444fab396c3fadeaefc4421b459f4504

    • SHA512

      4cda78987dab3668f0adb1d351102d35a0b3092db46aafcd113612cf96945e64a3bfeb1d92eed91e442d51eeb6567bdf81086461cf1fb9342b364d7101d3fe8a

    • SSDEEP

      3072:LwF8T0PAmr9B4NgVjGt1rOikGML7oCmFZKnbmLLLU7:8FCqxB4Ng9GLjcoCmFJLXU7

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets file execution options in registry

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks