General

  • Target

    685988f0e34ca67647d7b97f35decedc

  • Size

    96KB

  • Sample

    240119-w9y9cabefm

  • MD5

    685988f0e34ca67647d7b97f35decedc

  • SHA1

    0c55b1bbdd5e226a0787ef82aae79c8a7439e78c

  • SHA256

    4fae0e5f3a40eb4ec224a211964012cdec8f1858196a71d9f2ba9e225c1a237a

  • SHA512

    55e0d4d56e1793f440c0fdf3709aeecaf47f177daf9d7b54636aca097753dfe44fd27fa61765d485d54f5636a1c74a26b5e9100d18f11b6a6b3f33eb048c4c04

  • SSDEEP

    1536:0QFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prQK7DPOQnZHTa:0iS4jHS8q/3nTzePCwNUh4E9L7pZHTa

Malware Config

Targets

    • Target

      685988f0e34ca67647d7b97f35decedc

    • Size

      96KB

    • MD5

      685988f0e34ca67647d7b97f35decedc

    • SHA1

      0c55b1bbdd5e226a0787ef82aae79c8a7439e78c

    • SHA256

      4fae0e5f3a40eb4ec224a211964012cdec8f1858196a71d9f2ba9e225c1a237a

    • SHA512

      55e0d4d56e1793f440c0fdf3709aeecaf47f177daf9d7b54636aca097753dfe44fd27fa61765d485d54f5636a1c74a26b5e9100d18f11b6a6b3f33eb048c4c04

    • SSDEEP

      1536:0QFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prQK7DPOQnZHTa:0iS4jHS8q/3nTzePCwNUh4E9L7pZHTa

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks