General

  • Target

    428953d326aea4be1445afe7684143b7f9d014f54e281d5b005e144406e2871f

  • Size

    2.8MB

  • Sample

    231024-e6nvrscc58

  • MD5

    85d4bdf57db35a9c5c4a4390160df479

  • SHA1

    b4b768402ebd814e21c1590afc6029ac73f8954e

  • SHA256

    428953d326aea4be1445afe7684143b7f9d014f54e281d5b005e144406e2871f

  • SHA512

    68d7819aa28f921821ee0d632b2975b9875eb82d48e39cf782a452551e3ee00d6cb6b1e4bde297e429516d768f5c32cbff06d85fc403bd0eae63888aba27a40d

  • SSDEEP

    49152:gWONjfsJlQ4tMnGSorq1b4pJNEtlu0qBTSqZSr2gIak0bMred3f/Gg/G:kNjfs84tMnGPqWpJNEtlu0qBWzr2gIud

Score
10/10

Malware Config

Targets

    • Target

      428953d326aea4be1445afe7684143b7f9d014f54e281d5b005e144406e2871f

    • Size

      2.8MB

    • MD5

      85d4bdf57db35a9c5c4a4390160df479

    • SHA1

      b4b768402ebd814e21c1590afc6029ac73f8954e

    • SHA256

      428953d326aea4be1445afe7684143b7f9d014f54e281d5b005e144406e2871f

    • SHA512

      68d7819aa28f921821ee0d632b2975b9875eb82d48e39cf782a452551e3ee00d6cb6b1e4bde297e429516d768f5c32cbff06d85fc403bd0eae63888aba27a40d

    • SSDEEP

      49152:gWONjfsJlQ4tMnGSorq1b4pJNEtlu0qBTSqZSr2gIak0bMred3f/Gg/G:kNjfs84tMnGPqWpJNEtlu0qBWzr2gIud

    Score
    10/10
    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks