General

  • Target

    1f8ef14121f87dc3c1f0fe50da2642b0

  • Size

    95KB

  • Sample

    231230-26c5lacdf8

  • MD5

    1f8ef14121f87dc3c1f0fe50da2642b0

  • SHA1

    7d291795e2f6aba675fedaf16f3381b1a576c63c

  • SHA256

    a915f8bec41c30c7e93b2170187f0888aec0efd3a16eacb4b466aa70fcf5e59d

  • SHA512

    90ae368bf91a7899cbd6a90a8f261d6a61c46dae7ec06ce3a07c5997c12dcb6b33b674ea46edf9a5fadb6b96bd6d9be21f42bb3bc859f738056edb0429d034b1

  • SSDEEP

    1536:SYFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prFm2d11C:SKS4jHS8q/3nTzePCwNUh4E9Fm2d11C

Malware Config

Targets

    • Target

      1f8ef14121f87dc3c1f0fe50da2642b0

    • Size

      95KB

    • MD5

      1f8ef14121f87dc3c1f0fe50da2642b0

    • SHA1

      7d291795e2f6aba675fedaf16f3381b1a576c63c

    • SHA256

      a915f8bec41c30c7e93b2170187f0888aec0efd3a16eacb4b466aa70fcf5e59d

    • SHA512

      90ae368bf91a7899cbd6a90a8f261d6a61c46dae7ec06ce3a07c5997c12dcb6b33b674ea46edf9a5fadb6b96bd6d9be21f42bb3bc859f738056edb0429d034b1

    • SSDEEP

      1536:SYFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prFm2d11C:SKS4jHS8q/3nTzePCwNUh4E9Fm2d11C

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks