General

  • Target

    a26946c4c2e79e6dd2a9f5a45aeb5b09

  • Size

    373KB

  • Sample

    240224-wq2v5aad28

  • MD5

    a26946c4c2e79e6dd2a9f5a45aeb5b09

  • SHA1

    f2908cc96376f297830811dfab97f368208db147

  • SHA256

    a6c1bbc89bf46147c105da7c6a14176b14dde2601806e546e7ad5ba50c1e591e

  • SHA512

    570bb67dce7f6c119df077499e4d9ac271fe0d9944d6140ea14959beb9c579e8e87024909526934f4bc49b17bd33f3e78e82e765e3f56ad2d37934d2735dada6

  • SSDEEP

    6144:c86q1WqF2idZecnl20lHRxp3gwAlZDIvybq1LeCKk+P2QhymIkHZCghjAlLO:0KWmF3Z4mxxQfUv33h9Qv4ssZO

Malware Config

Targets

    • Target

      a26946c4c2e79e6dd2a9f5a45aeb5b09

    • Size

      373KB

    • MD5

      a26946c4c2e79e6dd2a9f5a45aeb5b09

    • SHA1

      f2908cc96376f297830811dfab97f368208db147

    • SHA256

      a6c1bbc89bf46147c105da7c6a14176b14dde2601806e546e7ad5ba50c1e591e

    • SHA512

      570bb67dce7f6c119df077499e4d9ac271fe0d9944d6140ea14959beb9c579e8e87024909526934f4bc49b17bd33f3e78e82e765e3f56ad2d37934d2735dada6

    • SSDEEP

      6144:c86q1WqF2idZecnl20lHRxp3gwAlZDIvybq1LeCKk+P2QhymIkHZCghjAlLO:0KWmF3Z4mxxQfUv33h9Qv4ssZO

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Drops file in Drivers directory

    • Sets DLL path for service in the registry

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks