General

  • Target

    fe37f090254ebab9e1a5fefcc7367ac16617e24f8819f31cf07f301adb498677

  • Size

    2.1MB

  • Sample

    231105-t8np4sha2s

  • MD5

    af282cb1792f5e49af47dd0052312241

  • SHA1

    3880a89bfeaf8eeb1cac5c75d5466ddbbe19e5ab

  • SHA256

    fe37f090254ebab9e1a5fefcc7367ac16617e24f8819f31cf07f301adb498677

  • SHA512

    e036ece3e7574fc27aec635dfe7e9206cd98de5b1eda969734628d93f3b32e79461288f9adc4e36559fe4bfba77f4724480bf766f973227f9f08962d45fa9c67

  • SSDEEP

    49152:xVsHNVFXUhKspt22fq6AFbTj1uj53f/S:DINVFXyKspxqpFbTBsf

Malware Config

Targets

    • Target

      fe37f090254ebab9e1a5fefcc7367ac16617e24f8819f31cf07f301adb498677

    • Size

      2.1MB

    • MD5

      af282cb1792f5e49af47dd0052312241

    • SHA1

      3880a89bfeaf8eeb1cac5c75d5466ddbbe19e5ab

    • SHA256

      fe37f090254ebab9e1a5fefcc7367ac16617e24f8819f31cf07f301adb498677

    • SHA512

      e036ece3e7574fc27aec635dfe7e9206cd98de5b1eda969734628d93f3b32e79461288f9adc4e36559fe4bfba77f4724480bf766f973227f9f08962d45fa9c67

    • SSDEEP

      49152:xVsHNVFXUhKspt22fq6AFbTj1uj53f/S:DINVFXyKspxqpFbTBsf

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks