General

  • Target

    968aadb9874bd87ef21a5c9457f4811ed9c9f6f5a609a192e0fd3d2b78e6a1b6

  • Size

    301KB

  • Sample

    221207-crjldsaa5x

  • MD5

    0ec24820c8a56f68f1314e0cd5df22d1

  • SHA1

    7d3d7db55c7ac15b85fe25f57f32c5974b444f64

  • SHA256

    968aadb9874bd87ef21a5c9457f4811ed9c9f6f5a609a192e0fd3d2b78e6a1b6

  • SHA512

    d110d65fda0ca27803452015c97fc80abdd10291d3afb46cb51624ce435f6abfeccfca1effa10a773d440c44e217b539c61baef21c1fe7690744483add1fac67

  • SSDEEP

    6144:tgeeoNppQVH0pwpMy65Xy/TaMsHleE8wrHDpgSOhCrdUvMyP:tgeeoNpiVH0pphy/TQHCwTDySOhCrmv1

Malware Config

Targets

    • Target

      968aadb9874bd87ef21a5c9457f4811ed9c9f6f5a609a192e0fd3d2b78e6a1b6

    • Size

      301KB

    • MD5

      0ec24820c8a56f68f1314e0cd5df22d1

    • SHA1

      7d3d7db55c7ac15b85fe25f57f32c5974b444f64

    • SHA256

      968aadb9874bd87ef21a5c9457f4811ed9c9f6f5a609a192e0fd3d2b78e6a1b6

    • SHA512

      d110d65fda0ca27803452015c97fc80abdd10291d3afb46cb51624ce435f6abfeccfca1effa10a773d440c44e217b539c61baef21c1fe7690744483add1fac67

    • SSDEEP

      6144:tgeeoNppQVH0pwpMy65Xy/TaMsHleE8wrHDpgSOhCrdUvMyP:tgeeoNpiVH0pphy/TQHCwTDySOhCrmv1

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v6

Tasks