General

  • Target

    Sou-gou-X6.6.8.exe

  • Size

    134.1MB

  • Sample

    230828-ehjk5sfd87

  • MD5

    378362b8a24a7739edeb122177111d7f

  • SHA1

    31d8cd83dbe1b4388fd8171e723d5b132b008892

  • SHA256

    ac2306b2587821cb68b1df8463e47c53e3395a16e03e8909d84dba34195d994f

  • SHA512

    d305710c09c66b38fc406124d49a16bd9b3a016a8fa1b2187e723db777c88535e28d84995e569bebc0f6e9ee3eff78dbf94d08dd847763ac4a4fb693615b9c27

  • SSDEEP

    3145728:mcUSuZ5GIuR1rZLGwlOOV3sr0G+9+hEd9sxwoOzhZ:DURPC15flXV3sQGG+hEd9NoOb

Malware Config

Targets

    • Target

      Sou-gou-X6.6.8.exe

    • Size

      134.1MB

    • MD5

      378362b8a24a7739edeb122177111d7f

    • SHA1

      31d8cd83dbe1b4388fd8171e723d5b132b008892

    • SHA256

      ac2306b2587821cb68b1df8463e47c53e3395a16e03e8909d84dba34195d994f

    • SHA512

      d305710c09c66b38fc406124d49a16bd9b3a016a8fa1b2187e723db777c88535e28d84995e569bebc0f6e9ee3eff78dbf94d08dd847763ac4a4fb693615b9c27

    • SSDEEP

      3145728:mcUSuZ5GIuR1rZLGwlOOV3sr0G+9+hEd9sxwoOzhZ:DURPC15flXV3sQGG+hEd9NoOb

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • UAC bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks