General

  • Target

    FK.zip

  • Size

    2.7MB

  • Sample

    231105-sjalhshg28

  • MD5

    802e065400ebd05916440bc167566373

  • SHA1

    97e4e85cee844cbfded3d51afe20f24fe50c9ea7

  • SHA256

    54c27525fac214f62a15b08cc3707d4ab248448d7a78661110db829496297d1d

  • SHA512

    ec705a35622a987a70a98b57f0848022f147566352406e8157eeef5a6746d60f2e777f200cbe2791210708949c11b638c3aa82de7ac0c7440f5dcf29cf960816

  • SSDEEP

    49152:dggxw0YknK4pgKxK8/6l/mcRS4xdR2hOq0qXOFovFwjpkOA5miaHRdNtE:dgW8GKLKb4RSEkF0qXOKShUOHRja

Malware Config

Extracted

Family

gh0strat

C2

27.124.10.162

Targets

    • Target

      11L3O67.exe

    • Size

      3.3MB

    • MD5

      55676704ea30ec80782a6fe129ecd07a

    • SHA1

      b2935565cc449db1ceb78618f06b145eed7b129f

    • SHA256

      add99c5e79d3b6736133c2d0336c8386b7c68ce99839b83208ba3b832e5627ff

    • SHA512

      3ceead21394022fd33cbfec8332a67791223d52189d7b383c714662fcb8d2f7354a3070a80219e49840f793402a7726b003bd5a1a9aa77e014c26a6e9c5fcd9c

    • SSDEEP

      98304:ZGwl5CrmnosDeIp8ZoctqhBtky7zZ+iDCRDtVCQ4:ZXl5HnoipqkhBtky7zZeRDtZ4

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • UAC bypass

    • Modifies RDP port number used by Windows

MITRE ATT&CK Enterprise v15

Tasks