General

  • Target

    d4a7cc4fcc630b1bbb4ecc13a60fb07402844cdeba24c76794e8b76bc84e858b

  • Size

    264KB

  • Sample

    221203-2kpaqsbg33

  • MD5

    f6e0bb067bd37db70723c6a85bb88f00

  • SHA1

    957589f6cde224a480ba6b8b9f0b89e86b6c58cc

  • SHA256

    d4a7cc4fcc630b1bbb4ecc13a60fb07402844cdeba24c76794e8b76bc84e858b

  • SHA512

    03253eb8c1189c443b92893e76e6619e18aadb08239fbee13ada8df942eda01f191be280cb325f41666d9549c1d53144f9ff3349e9763922ad6ddf24e288baa0

  • SSDEEP

    6144:GZbXGgeRu/HYMDUkR3GKvf8QLBBzAM+GuN8QpKPW:GZjGgeRu1DUIlLbzL+jkW

Malware Config

Targets

    • Target

      d4a7cc4fcc630b1bbb4ecc13a60fb07402844cdeba24c76794e8b76bc84e858b

    • Size

      264KB

    • MD5

      f6e0bb067bd37db70723c6a85bb88f00

    • SHA1

      957589f6cde224a480ba6b8b9f0b89e86b6c58cc

    • SHA256

      d4a7cc4fcc630b1bbb4ecc13a60fb07402844cdeba24c76794e8b76bc84e858b

    • SHA512

      03253eb8c1189c443b92893e76e6619e18aadb08239fbee13ada8df942eda01f191be280cb325f41666d9549c1d53144f9ff3349e9763922ad6ddf24e288baa0

    • SSDEEP

      6144:GZbXGgeRu/HYMDUkR3GKvf8QLBBzAM+GuN8QpKPW:GZjGgeRu1DUIlLbzL+jkW

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v6

Tasks