General

  • Target

    87b593f5e228708b81851d3084b9e87b48655046c314403854cd138a5d10ae89

  • Size

    336KB

  • Sample

    230824-d56hrahg63

  • MD5

    e8e30867983295aecf1dec35b678e16f

  • SHA1

    35e2c51cd435d344e181f57cc524a1496169127d

  • SHA256

    87b593f5e228708b81851d3084b9e87b48655046c314403854cd138a5d10ae89

  • SHA512

    f366714307529af3caf237716d8a2b820bfb409ac221100e77fbdcaf2d71b4d83896038b66a17f56b94e743db3729e6043016fb6638c9b64c28cd3b82699a8de

  • SSDEEP

    3072:Kiqg6665iNkk5gguvVNJKY4h5kIZXwlWg1LrANgl:KQUiC5HbA5kIZg0aZ

Malware Config

Extracted

Family

gh0strat

C2

rere.e3.luyouxia.net

Targets

    • Target

      87b593f5e228708b81851d3084b9e87b48655046c314403854cd138a5d10ae89

    • Size

      336KB

    • MD5

      e8e30867983295aecf1dec35b678e16f

    • SHA1

      35e2c51cd435d344e181f57cc524a1496169127d

    • SHA256

      87b593f5e228708b81851d3084b9e87b48655046c314403854cd138a5d10ae89

    • SHA512

      f366714307529af3caf237716d8a2b820bfb409ac221100e77fbdcaf2d71b4d83896038b66a17f56b94e743db3729e6043016fb6638c9b64c28cd3b82699a8de

    • SSDEEP

      3072:Kiqg6665iNkk5gguvVNJKY4h5kIZXwlWg1LrANgl:KQUiC5HbA5kIZg0aZ

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks