General

  • Target

    6378a3a153dba78e21c4d7f96d4dfec0.bin

  • Size

    29KB

  • Sample

    230228-bstx3sgf6w

  • MD5

    e7fe33c7df8bbff6e1ca94b16600dba1

  • SHA1

    e07c906dc45bf3243cca6fe7b6359dafec231ab2

  • SHA256

    ca65b04cb8cf7111caa31a446cf35a8769f47640209a05bf632910e04e9c2f09

  • SHA512

    0ce757367a6435bc2b063ca1b9c184909ceab52ec3f3a274c441c572da58931e4ae42563e29beee0d3528a213f7d710c10cd63ceb3b6ecc8560b578d39a7dd6c

  • SSDEEP

    768:JDUZ1jcNJNDQ3D5CDa6zelbtj3h6U0NkIIuzdZiCSg2:JD61jcNJN/Da6zWbf6Ul1uzdZiCF2

Malware Config

Targets

    • Target

      829567da24356078abb1ff8beb1b53e460cb4f1d67fab2b1d605912b8b7c438c.exe

    • Size

      32KB

    • MD5

      6378a3a153dba78e21c4d7f96d4dfec0

    • SHA1

      a5cd66f84195cdd90362c62746cfefeddc49ed6b

    • SHA256

      829567da24356078abb1ff8beb1b53e460cb4f1d67fab2b1d605912b8b7c438c

    • SHA512

      b320eb7f68a619d62dbe6a83b27cea5770319bc986dcf0a2344f9dc01a18b91af0be173c1d526c1fcbb43d9a91dd787f3a800a3a5ecb68fb4df66ca55ea8ccb2

    • SSDEEP

      768:zkw/iOWTK3JWhOM/qZh7UJGcZ/iGUOnbcuyD7U7s9:/QK52fqZSIA6GUOnouy87s9

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • RunningRat

      RunningRat is a remote access trojan first seen in 2018.

    • Sets DLL path for service in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Creates a Windows Service

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks