General

  • Target

    deb537f731d2d316a688b0b47a6019772d1f2720e00bf3cf3c830eb2130e0046

  • Size

    137KB

  • Sample

    231012-xcnl1sgd21

  • MD5

    cc2d3beeac14ed23a22322d10421698a

  • SHA1

    cd6e92f037f2953adcc0c15e6e6a63e025ad118f

  • SHA256

    deb537f731d2d316a688b0b47a6019772d1f2720e00bf3cf3c830eb2130e0046

  • SHA512

    1658b74eca7e151a4cefc001723f3ac27579445a04346344ac4fc785df5ea1a93c9c98d349015ac3728561477fc93f90dc0c902c425e3a9134dc87dc10d6c68d

  • SSDEEP

    3072:kUDBHy4BBy6eFJrmmIewRxM5JSQcqj3G/EAeq:k0yB6oJrcRWQ/qj2EL

Malware Config

Targets

    • Target

      deb537f731d2d316a688b0b47a6019772d1f2720e00bf3cf3c830eb2130e0046

    • Size

      137KB

    • MD5

      cc2d3beeac14ed23a22322d10421698a

    • SHA1

      cd6e92f037f2953adcc0c15e6e6a63e025ad118f

    • SHA256

      deb537f731d2d316a688b0b47a6019772d1f2720e00bf3cf3c830eb2130e0046

    • SHA512

      1658b74eca7e151a4cefc001723f3ac27579445a04346344ac4fc785df5ea1a93c9c98d349015ac3728561477fc93f90dc0c902c425e3a9134dc87dc10d6c68d

    • SSDEEP

      3072:kUDBHy4BBy6eFJrmmIewRxM5JSQcqj3G/EAeq:k0yB6oJrcRWQ/qj2EL

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks