General

  • Target

    ed26e16e74e691c68bf57a22086dc936c24022740718ebc93c794236b7affba9

  • Size

    888KB

  • Sample

    230327-khlndsef2t

  • MD5

    894cabf40598fc7cd2fd2ece717644b7

  • SHA1

    f8ffc78e53a969bf35b715658a4478ff75d71c6d

  • SHA256

    ed26e16e74e691c68bf57a22086dc936c24022740718ebc93c794236b7affba9

  • SHA512

    79827b2f9e095263d916e98a06f69d70915575b69a0e8ae62deabf2834c15e9fa4ce284ab61ce47fc8a073cc7783171783daee50fa9dc99ef24e515dd9ac35a9

  • SSDEEP

    12288:agfLDRq1mDO/YpHn5oOJTYYv4n4fuSVF+R47bJwO8s4rUiBoGP0NBsybssHhlvVM:Z5frNFJTVvjfuS3hXR8f1vyIsHhSdR

Score
10/10

Malware Config

Extracted

Family

gh0strat

C2

30.cmananan.com

Targets

    • Target

      ed26e16e74e691c68bf57a22086dc936c24022740718ebc93c794236b7affba9

    • Size

      888KB

    • MD5

      894cabf40598fc7cd2fd2ece717644b7

    • SHA1

      f8ffc78e53a969bf35b715658a4478ff75d71c6d

    • SHA256

      ed26e16e74e691c68bf57a22086dc936c24022740718ebc93c794236b7affba9

    • SHA512

      79827b2f9e095263d916e98a06f69d70915575b69a0e8ae62deabf2834c15e9fa4ce284ab61ce47fc8a073cc7783171783daee50fa9dc99ef24e515dd9ac35a9

    • SSDEEP

      12288:agfLDRq1mDO/YpHn5oOJTYYv4n4fuSVF+R47bJwO8s4rUiBoGP0NBsybssHhlvVM:Z5frNFJTVvjfuS3hXR8f1vyIsHhSdR

    Score
    10/10
    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks