General

  • Target

    家庭日常菜素材版教程.exe

  • Size

    2.0MB

  • Sample

    230612-tdcdlade2s

  • MD5

    54da74f54571d7727d575a46364d8cfe

  • SHA1

    ba680e3d604fa326b55801bc2af4667a54afbe25

  • SHA256

    3115da1c274f378293e579087aa2789d86c4de13f1db9f7a5b5468c55f101c79

  • SHA512

    956eb68fbf6bb52f096c36d64ddcc371d5ec793f759c47d57518388e041eebbc8c21bbf32d399178b61a98de904daac6ac715e78a400a07f89324899144fffb6

  • SSDEEP

    49152:NCAdw0gW0dvWmWMF1CS8dqBzMAPyTTHbuEtoisshLms4NV7ojUH1uQWdOGDktv2e:pyk0dvWmWMF1atTTCEtoisshLmHAUH1G

Score
10/10

Malware Config

Targets

    • Target

      家庭日常菜素材版教程.exe

    • Size

      2.0MB

    • MD5

      54da74f54571d7727d575a46364d8cfe

    • SHA1

      ba680e3d604fa326b55801bc2af4667a54afbe25

    • SHA256

      3115da1c274f378293e579087aa2789d86c4de13f1db9f7a5b5468c55f101c79

    • SHA512

      956eb68fbf6bb52f096c36d64ddcc371d5ec793f759c47d57518388e041eebbc8c21bbf32d399178b61a98de904daac6ac715e78a400a07f89324899144fffb6

    • SSDEEP

      49152:NCAdw0gW0dvWmWMF1CS8dqBzMAPyTTHbuEtoisshLms4NV7ojUH1uQWdOGDktv2e:pyk0dvWmWMF1atTTCEtoisshLmHAUH1G

    Score
    10/10
    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks