General

  • Target

    ae15d10a145cc5b3c0e59a2369a532930913ad3c381a71a1c1d11e8e75b34320

  • Size

    156KB

  • Sample

    221128-gj4zksae38

  • MD5

    8b5d9d8ed72f6c7df66a8fb93609d465

  • SHA1

    ef9c23d17d2d99c2e730d14707999891aa685b3b

  • SHA256

    ae15d10a145cc5b3c0e59a2369a532930913ad3c381a71a1c1d11e8e75b34320

  • SHA512

    f0b1affde400b95b3397b31f9216bbc2a1dd08413878082fa3f3aa769a1f049178d177566aeb309623052840bfad3a7cf7fe7638c065e9dd24cd222c3e9dce98

  • SSDEEP

    3072:PO+JlkeHRQFxJZWg/Dnq0iurbi6ZYYWYR5UtJ+c+aiV:XlkeHR4ZVDPxVFWq5Ur+c+9V

Malware Config

Targets

    • Target

      ae15d10a145cc5b3c0e59a2369a532930913ad3c381a71a1c1d11e8e75b34320

    • Size

      156KB

    • MD5

      8b5d9d8ed72f6c7df66a8fb93609d465

    • SHA1

      ef9c23d17d2d99c2e730d14707999891aa685b3b

    • SHA256

      ae15d10a145cc5b3c0e59a2369a532930913ad3c381a71a1c1d11e8e75b34320

    • SHA512

      f0b1affde400b95b3397b31f9216bbc2a1dd08413878082fa3f3aa769a1f049178d177566aeb309623052840bfad3a7cf7fe7638c065e9dd24cd222c3e9dce98

    • SSDEEP

      3072:PO+JlkeHRQFxJZWg/Dnq0iurbi6ZYYWYR5UtJ+c+aiV:XlkeHR4ZVDPxVFWq5Ur+c+9V

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Sets file execution options in registry

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Tasks