General

  • Target

    7e53aa0bba0b1079b4c2ae11c32cb3da48f20a99172b456b9a962ee7ee19c5f6

  • Size

    404KB

  • Sample

    221128-pdxx3sge3x

  • MD5

    613c0c2c66307afbf66c74c4822849af

  • SHA1

    ce3a007777c7c6f7f86d42885171b17c33790ac0

  • SHA256

    7e53aa0bba0b1079b4c2ae11c32cb3da48f20a99172b456b9a962ee7ee19c5f6

  • SHA512

    9a83c42a593388b1782cf3bcbeeef8130eb8e88c2c023ece1bdb4ab4bfa5066f28846736b16445e2fa34620b7eaee5c41c3aafcfa4fa1b4afec36b7031110455

  • SSDEEP

    12288:nsaY8rkJ/7N044zlZGhOb58KbIN2K23qNG7b:B/rOzwZP59bINdCqNgb

Malware Config

Targets

    • Target

      7e53aa0bba0b1079b4c2ae11c32cb3da48f20a99172b456b9a962ee7ee19c5f6

    • Size

      404KB

    • MD5

      613c0c2c66307afbf66c74c4822849af

    • SHA1

      ce3a007777c7c6f7f86d42885171b17c33790ac0

    • SHA256

      7e53aa0bba0b1079b4c2ae11c32cb3da48f20a99172b456b9a962ee7ee19c5f6

    • SHA512

      9a83c42a593388b1782cf3bcbeeef8130eb8e88c2c023ece1bdb4ab4bfa5066f28846736b16445e2fa34620b7eaee5c41c3aafcfa4fa1b4afec36b7031110455

    • SSDEEP

      12288:nsaY8rkJ/7N044zlZGhOb58KbIN2K23qNG7b:B/rOzwZP59bINdCqNgb

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks