General

  • Target

    71fd4094a95d5065f2a37b563bcde4f48a41551e5df4ad8f519d1c33a42836fb

  • Size

    123KB

  • Sample

    221128-gwdyxsfe4x

  • MD5

    66d8a73d62492f3df6a3b26c019f01f3

  • SHA1

    319a7347733770acd501dc9882e8c8c93c2726d6

  • SHA256

    71fd4094a95d5065f2a37b563bcde4f48a41551e5df4ad8f519d1c33a42836fb

  • SHA512

    9e9f453335ab58afff79118ec0b9d7cbd5ed8092f9a78e13537f53ac70a71949abcbff7d62a05d60e09dc3870d837eddef78a4dfd9cc50303dacbeed55b41b09

  • SSDEEP

    3072:Vg1yQEYG/t9YLbaToQkiOAai3q5btf//s7FC0BKwG:VKyQEllSLbas/EaEIbtf//slBQ

Malware Config

Targets

    • Target

      71fd4094a95d5065f2a37b563bcde4f48a41551e5df4ad8f519d1c33a42836fb

    • Size

      123KB

    • MD5

      66d8a73d62492f3df6a3b26c019f01f3

    • SHA1

      319a7347733770acd501dc9882e8c8c93c2726d6

    • SHA256

      71fd4094a95d5065f2a37b563bcde4f48a41551e5df4ad8f519d1c33a42836fb

    • SHA512

      9e9f453335ab58afff79118ec0b9d7cbd5ed8092f9a78e13537f53ac70a71949abcbff7d62a05d60e09dc3870d837eddef78a4dfd9cc50303dacbeed55b41b09

    • SSDEEP

      3072:Vg1yQEYG/t9YLbaToQkiOAai3q5btf//s7FC0BKwG:VKyQEllSLbas/EaEIbtf//slBQ

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Sets DLL path for service in the registry

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks