General

  • Target

    b6319f257a7254845a3b9d581487f1c21c4273e8916a8882c384b9f8fa8c15cd

  • Size

    108KB

  • Sample

    221201-mejezahe82

  • MD5

    e7dd01078aa7d5e76f841cdd9e8ed3c1

  • SHA1

    bbe9c132104b183537f4e8dbdbfda3af40571024

  • SHA256

    b6319f257a7254845a3b9d581487f1c21c4273e8916a8882c384b9f8fa8c15cd

  • SHA512

    00bdfa47c6f242b9f3e076d471548a06052b02a7732f1f163e34a6d758d1b3d6b802087194c412f10d43d276da80d6fe648d9e45a81df24fe92202f1e8e90e03

  • SSDEEP

    3072:/ESUnnVCKBt2q0nyXUmeR6dWj/RaJJ1cOxrpW:/ESUnnVhBt2qKCUmQbjZoJ12

Malware Config

Targets

    • Target

      b6319f257a7254845a3b9d581487f1c21c4273e8916a8882c384b9f8fa8c15cd

    • Size

      108KB

    • MD5

      e7dd01078aa7d5e76f841cdd9e8ed3c1

    • SHA1

      bbe9c132104b183537f4e8dbdbfda3af40571024

    • SHA256

      b6319f257a7254845a3b9d581487f1c21c4273e8916a8882c384b9f8fa8c15cd

    • SHA512

      00bdfa47c6f242b9f3e076d471548a06052b02a7732f1f163e34a6d758d1b3d6b802087194c412f10d43d276da80d6fe648d9e45a81df24fe92202f1e8e90e03

    • SSDEEP

      3072:/ESUnnVCKBt2q0nyXUmeR6dWj/RaJJ1cOxrpW:/ESUnnVhBt2qKCUmQbjZoJ12

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks