General

  • Target

    9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c

  • Size

    392KB

  • Sample

    221203-2k34wsff7y

  • MD5

    e5bc9ca9ea589d5aabd8325e8476d253

  • SHA1

    c2fa8a3dbfeb72df437fe70dfb2e2d07429ff415

  • SHA256

    9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c

  • SHA512

    dfc18b03177badb480e15eebc825e56b838a66161ecfe4988218f83dedb7cec47a2aea75c01aad29928e55d86d4d97acc28bd27b88db8f34a44df5ca89304a2d

  • SSDEEP

    6144:GZbXGgeRu/HYMDUkR3GKvf8QLBBzAM+GuN8QpKP+fA:GZjGgeRu1DUIlLbzL+jk+fA

Malware Config

Targets

    • Target

      9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c

    • Size

      392KB

    • MD5

      e5bc9ca9ea589d5aabd8325e8476d253

    • SHA1

      c2fa8a3dbfeb72df437fe70dfb2e2d07429ff415

    • SHA256

      9f5c7e2bdaa4d43e455270ecefcaa34edc0c7c7388bdd345e3d4f4f4477e9d8c

    • SHA512

      dfc18b03177badb480e15eebc825e56b838a66161ecfe4988218f83dedb7cec47a2aea75c01aad29928e55d86d4d97acc28bd27b88db8f34a44df5ca89304a2d

    • SSDEEP

      6144:GZbXGgeRu/HYMDUkR3GKvf8QLBBzAM+GuN8QpKP+fA:GZjGgeRu1DUIlLbzL+jk+fA

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v6

Tasks