General

  • Target

    b701769b519c9bcb5651aa6f55a134099ea089c12b7b04a95b9da00446f4685b

  • Size

    2.2MB

  • Sample

    231116-d9d93afd73

  • MD5

    74819fb3e509870275aa941cca16bd73

  • SHA1

    147b4881600e353bf0d2cea2b311a45eca70a1fe

  • SHA256

    b701769b519c9bcb5651aa6f55a134099ea089c12b7b04a95b9da00446f4685b

  • SHA512

    8d69f8ceecb7fdc32892473be2e1d49c8df04d2f080158d7e192278acdcd1e46c85b55339144819d72d30a3d6d6c0f92f53d6fa5153238223924c0e22c3f280f

  • SSDEEP

    24576:cBbCXPFMtY8gUOy9LHdcAgWIMz7b2bj84zQ:cNgUDdcA/48R

Malware Config

Targets

    • Target

      b701769b519c9bcb5651aa6f55a134099ea089c12b7b04a95b9da00446f4685b

    • Size

      2.2MB

    • MD5

      74819fb3e509870275aa941cca16bd73

    • SHA1

      147b4881600e353bf0d2cea2b311a45eca70a1fe

    • SHA256

      b701769b519c9bcb5651aa6f55a134099ea089c12b7b04a95b9da00446f4685b

    • SHA512

      8d69f8ceecb7fdc32892473be2e1d49c8df04d2f080158d7e192278acdcd1e46c85b55339144819d72d30a3d6d6c0f92f53d6fa5153238223924c0e22c3f280f

    • SSDEEP

      24576:cBbCXPFMtY8gUOy9LHdcAgWIMz7b2bj84zQ:cNgUDdcA/48R

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Downloads MZ/PE file

    • Sets DLL path for service in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks