General

  • Target

    Load.zip

  • Size

    1.2MB

  • Sample

    231103-dvz8zsbd3t

  • MD5

    48add6107d9d7f27023df514636dba42

  • SHA1

    e0b267bb3720b63a291ba426777839e886eac785

  • SHA256

    5a29690b42487507b0450556c55276c446da7ca41c72861e57b5685869d24cd6

  • SHA512

    880bab6051d747a6f94262739a46764511414e43fc8ddbd6f07e246c12af53cfc7199c09b7a68f642a8654092c11a63ccc8f6c41741ca29135caf4b022358b11

  • SSDEEP

    24576:iTODPctPOBximjSoqBjfOpabJF1Mtkr6lciKqQtBn57u6eVSQWQPZ2DqUAR:iT9mamTqBjfQabJF1FNL57uJdBPZ2ePR

Malware Config

Extracted

Family

gh0strat

C2

27.124.10.162

Targets

    • Target

      ML7R9U7.exe

    • Size

      359KB

    • MD5

      a37556c8cfd7eaba495a318a0de59466

    • SHA1

      07707cba7364e130f35eddbcab7702db44e7e671

    • SHA256

      08e9d8d7b108683314e5fad199d52b868713807697704f08ddc4b825553cca20

    • SHA512

      be38b134da1675a51585787433b8ec98eee5940db103eac5e2e851c65e6050f45b943aa8fe76393f593f7de1a4de0a636327c3f78c3d7a056308fa3a54c08d23

    • SSDEEP

      6144:2ZpuZnVB3/nPwArobrJEoXG81WAheOBO77NsHJDi1tPYP6lLaYpPqQ5aSAwz07Au:2ZM13/nPw6ovJE2G8IAheOA7JsH1KtPm

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • UAC bypass

    • Modifies RDP port number used by Windows

MITRE ATT&CK Enterprise v15

Tasks