General

  • Target

    47448781d478d7bd769fc3b488d9631a5b8ec7a2bb18d7c036cdcf3eceac8ea0

  • Size

    182KB

  • Sample

    240329-l2b4qsfc66

  • MD5

    b485176ee110d18e239b7bd926cbe635

  • SHA1

    c4564a58db3caa55b4a85f3c528a833771e5f3b3

  • SHA256

    47448781d478d7bd769fc3b488d9631a5b8ec7a2bb18d7c036cdcf3eceac8ea0

  • SHA512

    944de179c0283a88e0a060622364d989cee39e4e932463c6a39200d1cf39bfcf8c16fec513759e42ad8b72076275fc8005e48a9af1266cb5d2a2031f4a3f457f

  • SSDEEP

    3072:nUDBHy4BBy6eFJrmmIewRxMzJSQ6rVf0SAeq:n0yB6oJrcRMQxrVf3

Score
10/10

Malware Config

Targets

    • Target

      47448781d478d7bd769fc3b488d9631a5b8ec7a2bb18d7c036cdcf3eceac8ea0

    • Size

      182KB

    • MD5

      b485176ee110d18e239b7bd926cbe635

    • SHA1

      c4564a58db3caa55b4a85f3c528a833771e5f3b3

    • SHA256

      47448781d478d7bd769fc3b488d9631a5b8ec7a2bb18d7c036cdcf3eceac8ea0

    • SHA512

      944de179c0283a88e0a060622364d989cee39e4e932463c6a39200d1cf39bfcf8c16fec513759e42ad8b72076275fc8005e48a9af1266cb5d2a2031f4a3f457f

    • SSDEEP

      3072:nUDBHy4BBy6eFJrmmIewRxMzJSQ6rVf0SAeq:n0yB6oJrcRMQxrVf3

    Score
    10/10
    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks