General

  • Target

    5ea12547b7603f496ddcd41ea3ca3d92e128615391b2e439d8ffceb3a56a9d9e

  • Size

    856KB

  • Sample

    231025-p23hgahe81

  • MD5

    3d460bd21fc92ecc0762cc106f3cc21c

  • SHA1

    a56619c80ffb5a13e272a25a8e0c09f09853b759

  • SHA256

    5ea12547b7603f496ddcd41ea3ca3d92e128615391b2e439d8ffceb3a56a9d9e

  • SHA512

    a619711f1fc232c032b9691c18654eb414d0fe3fd4ab3e743333dcd30501714121249048c162d1b418df622a8bcacab6dbfe5cf8e3e9f4a34018e594dcae61dc

  • SSDEEP

    24576:5i7NdO2XZVhW68pwn23DOeCfXahV+h6gG+w76Arm:QdXZV+pw2zOeoIwrw764m

Malware Config

Targets

    • Target

      5ea12547b7603f496ddcd41ea3ca3d92e128615391b2e439d8ffceb3a56a9d9e

    • Size

      856KB

    • MD5

      3d460bd21fc92ecc0762cc106f3cc21c

    • SHA1

      a56619c80ffb5a13e272a25a8e0c09f09853b759

    • SHA256

      5ea12547b7603f496ddcd41ea3ca3d92e128615391b2e439d8ffceb3a56a9d9e

    • SHA512

      a619711f1fc232c032b9691c18654eb414d0fe3fd4ab3e743333dcd30501714121249048c162d1b418df622a8bcacab6dbfe5cf8e3e9f4a34018e594dcae61dc

    • SSDEEP

      24576:5i7NdO2XZVhW68pwn23DOeCfXahV+h6gG+w76Arm:QdXZV+pw2zOeoIwrw764m

    • Generic Chinese Botnet

      A botnet originating from China which is currently unnamed publicly.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Chinese Botnet payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks