Analysis Overview
SHA256
71ff319179fef3be6d0e59439877346ff584f95644667530c96cb12e16ee0d97
Threat Level: Known bad
The file 71ff319179fef3be6d0e59439877346ff584f95644667530c96cb12e16ee0d97 was found to be: Known bad.
Malicious Activity Summary
Gh0st RAT payload
Gh0strat
Adds Run key to start application
Suspicious use of NtSetInformationThreadHideFromDebugger
Unsigned PE
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-04-07 00:01
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-07 00:01
Reported
2024-04-07 00:04
Platform
win7-20240221-en
Max time kernel
149s
Max time network
153s
Command Line
Signatures
Gh0st RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Gh0strat
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\71ff319179fef3be6d0e59439877346ff584f95644667530c96cb12e16ee0d97.exe" | C:\Users\Admin\AppData\Local\Temp\71ff319179fef3be6d0e59439877346ff584f95644667530c96cb12e16ee0d97.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
Processes
C:\Users\Admin\AppData\Local\Temp\71ff319179fef3be6d0e59439877346ff584f95644667530c96cb12e16ee0d97.exe
"C:\Users\Admin\AppData\Local\Temp\71ff319179fef3be6d0e59439877346ff584f95644667530c96cb12e16ee0d97.exe"
Network
| Country | Destination | Domain | Proto |
| CN | 42.194.196.162:8011 | tcp | |
| CN | 42.194.196.162:8011 | tcp | |
| CN | 42.194.196.162:8011 | tcp | |
| CN | 42.194.196.162:8011 | tcp | |
| CN | 42.194.196.162:8011 | tcp | |
| CN | 42.194.196.162:8011 | tcp |
Files
memory/2212-0-0x0000000000400000-0x000000000069B000-memory.dmp
memory/2212-1-0x00000000764D0000-0x0000000076517000-memory.dmp
memory/2212-811-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-812-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-814-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-816-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-818-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-820-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-822-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-824-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-826-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-828-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-830-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-832-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-834-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-836-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-838-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-840-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-842-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-844-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-846-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-848-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-850-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-852-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-854-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-856-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-858-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-860-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-862-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-864-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-866-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-868-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-870-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-872-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-2547-0x00000000021A0000-0x0000000002321000-memory.dmp
memory/2212-8692-0x0000000000400000-0x000000000069B000-memory.dmp
memory/2212-8693-0x00000000024E0000-0x00000000025F1000-memory.dmp
memory/2212-8701-0x0000000000400000-0x000000000069B000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-07 00:01
Reported
2024-04-07 00:04
Platform
win10v2004-20240226-en
Max time kernel
147s
Max time network
154s
Command Line
Signatures
Gh0st RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Gh0strat
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\71ff319179fef3be6d0e59439877346ff584f95644667530c96cb12e16ee0d97.exe" | C:\Users\Admin\AppData\Local\Temp\71ff319179fef3be6d0e59439877346ff584f95644667530c96cb12e16ee0d97.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
Processes
C:\Users\Admin\AppData\Local\Temp\71ff319179fef3be6d0e59439877346ff584f95644667530c96cb12e16ee0d97.exe
"C:\Users\Admin\AppData\Local\Temp\71ff319179fef3be6d0e59439877346ff584f95644667530c96cb12e16ee0d97.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 80.192.122.92.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 23.159.190.20.in-addr.arpa | udp |
| CN | 42.194.196.162:8011 | tcp | |
| US | 8.8.8.8:53 | 150.1.37.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| CN | 42.194.196.162:8011 | tcp | |
| CN | 42.194.196.162:8011 | tcp | |
| US | 8.8.8.8:53 | 145.83.221.88.in-addr.arpa | udp |
| CN | 42.194.196.162:8011 | tcp | |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 105.83.221.88.in-addr.arpa | udp |
| CN | 42.194.196.162:8011 | tcp | |
| CN | 42.194.196.162:8011 | tcp | |
| CN | 42.194.196.162:8011 | tcp | |
| US | 8.8.8.8:53 | 201.201.50.20.in-addr.arpa | udp |
Files
memory/840-0-0x0000000000400000-0x000000000069B000-memory.dmp
memory/840-1-0x0000000075B80000-0x0000000075D95000-memory.dmp
memory/840-3875-0x0000000077180000-0x0000000077320000-memory.dmp
memory/840-5884-0x0000000076530000-0x00000000765AA000-memory.dmp
memory/840-13069-0x0000000000400000-0x000000000069B000-memory.dmp
memory/840-13070-0x0000000000400000-0x000000000069B000-memory.dmp
memory/840-13071-0x0000000000400000-0x000000000069B000-memory.dmp
memory/840-13072-0x0000000000400000-0x000000000069B000-memory.dmp
memory/840-13074-0x0000000000400000-0x000000000069B000-memory.dmp
memory/840-13075-0x0000000000400000-0x000000000069B000-memory.dmp
memory/840-13076-0x0000000010000000-0x0000000010010000-memory.dmp
memory/840-13081-0x0000000000400000-0x000000000069B000-memory.dmp