General

  • Target

    1679446231214.zip

  • Size

    8KB

  • Sample

    230323-jqjckaec94

  • MD5

    0e92729611a1de2fc9b9c2fc1f08a89b

  • SHA1

    dd0a4a3c1511bfceffd342949cb4208a1cc39ece

  • SHA256

    24c9a7115471a7ddc4361c6f3752e75a2318a6ffa4373eeab9e8a60d720268d0

  • SHA512

    38db2440c375d32fae891bae9cd6bafd2b20c60eaed8c67e7485a08f43cb1a1cda765f4558998c6439d79e3886fcd2baafca444f0b84e18b0d6a9f3cb9027ad2

  • SSDEEP

    192:o/Q1/+c2TgWmJfm+I54Y9IFtAQWH7Tlx7e7uhezNfQxM:oI1mczY+Dyhx1Gh

Score
10/10

Malware Config

Targets

    • Target

      ӷƱ (03).exe

    • Size

      36KB

    • MD5

      bf0a28efc4c32b857332250dbb1d132a

    • SHA1

      61039a5ec49b283775a232cb9c23ead25ca4d8d9

    • SHA256

      0525947d2063f56a8288dd3d54210fc49a3a615c338c4bd7260731649f9b7e5b

    • SHA512

      8ba699251c9a037d723b89b6edf57b1da0982e860983be4f340bd789214aff6ee98637999864641b281f9570ba3d60362c74c2ba151a1f3deb08cc9f84a7f6f0

    • SSDEEP

      192:tXU60V/WmoI+af4R9JNRcJLef3Rmtj0IRmtSgUoynSYgH9L1nnCQBRmlFQ93M3pc:tk60V/wI4PJhGYSGS1EtdLVC+w7QSc

    Score
    10/10
    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Blocklisted process makes network request

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks