General

  • Target

    6378a3a153dba78e21c4d7f96d4dfec0.exe

  • Size

    32KB

  • Sample

    230226-xm2xdshf8z

  • MD5

    6378a3a153dba78e21c4d7f96d4dfec0

  • SHA1

    a5cd66f84195cdd90362c62746cfefeddc49ed6b

  • SHA256

    829567da24356078abb1ff8beb1b53e460cb4f1d67fab2b1d605912b8b7c438c

  • SHA512

    b320eb7f68a619d62dbe6a83b27cea5770319bc986dcf0a2344f9dc01a18b91af0be173c1d526c1fcbb43d9a91dd787f3a800a3a5ecb68fb4df66ca55ea8ccb2

  • SSDEEP

    768:zkw/iOWTK3JWhOM/qZh7UJGcZ/iGUOnbcuyD7U7s9:/QK52fqZSIA6GUOnouy87s9

Malware Config

Targets

    • Target

      6378a3a153dba78e21c4d7f96d4dfec0.exe

    • Size

      32KB

    • MD5

      6378a3a153dba78e21c4d7f96d4dfec0

    • SHA1

      a5cd66f84195cdd90362c62746cfefeddc49ed6b

    • SHA256

      829567da24356078abb1ff8beb1b53e460cb4f1d67fab2b1d605912b8b7c438c

    • SHA512

      b320eb7f68a619d62dbe6a83b27cea5770319bc986dcf0a2344f9dc01a18b91af0be173c1d526c1fcbb43d9a91dd787f3a800a3a5ecb68fb4df66ca55ea8ccb2

    • SSDEEP

      768:zkw/iOWTK3JWhOM/qZh7UJGcZ/iGUOnbcuyD7U7s9:/QK52fqZSIA6GUOnouy87s9

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • RunningRat

      RunningRat is a remote access trojan first seen in 2018.

    • RunningRat payload

    • Sets DLL path for service in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Creates a Windows Service

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks