General

  • Target

    bef8ccb45e8ba48acf3d0e5e95e3dcb4

  • Size

    96KB

  • Sample

    240310-sz6c5afd63

  • MD5

    bef8ccb45e8ba48acf3d0e5e95e3dcb4

  • SHA1

    a1d1a16a91fba4932780ad78cd35ec4c43cd32de

  • SHA256

    12caf5c2952a719a8cc750b8cb087abba9d8fd4a076a953b618b4eeb5d7934c1

  • SHA512

    173a013e00f44a23f40a520c1b1ebee638ec439b821dc6efc1adb75ffa40ae9dfaf9f8b1e53647b2c0b9825b6c54f78cb4a229e8c8669f4811dadc69f1ec1dee

  • SSDEEP

    1536:5MFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prORPHtBzzIn:5eS4jHS8q/3nTzePCwNUh4E9OJtBzzG

Malware Config

Targets

    • Target

      bef8ccb45e8ba48acf3d0e5e95e3dcb4

    • Size

      96KB

    • MD5

      bef8ccb45e8ba48acf3d0e5e95e3dcb4

    • SHA1

      a1d1a16a91fba4932780ad78cd35ec4c43cd32de

    • SHA256

      12caf5c2952a719a8cc750b8cb087abba9d8fd4a076a953b618b4eeb5d7934c1

    • SHA512

      173a013e00f44a23f40a520c1b1ebee638ec439b821dc6efc1adb75ffa40ae9dfaf9f8b1e53647b2c0b9825b6c54f78cb4a229e8c8669f4811dadc69f1ec1dee

    • SSDEEP

      1536:5MFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prORPHtBzzIn:5eS4jHS8q/3nTzePCwNUh4E9OJtBzzG

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks