General

  • Target

    f5779045a4f8a31b8604d2c759ce710f217b99415ed57689c2b3f9946d8462bc

  • Size

    1.0MB

  • Sample

    240417-mphanacc23

  • MD5

    b7f7eccc38bd334fd00d2e7d2f4b9c8f

  • SHA1

    7e5f9d367a3848c0ee1db0078c27083da6e96291

  • SHA256

    f5779045a4f8a31b8604d2c759ce710f217b99415ed57689c2b3f9946d8462bc

  • SHA512

    f8fbfc08d633b0739326491c96189c7cef4652f5bd2a12130c142174033f3623e74e53be1343dc4184d281133d53f3d9f1b20516e9d9cdb9728982a3d593c339

  • SSDEEP

    12288:6De4Fy/UQ0Vmu+X5IGasus/hP4ixLz1i7G8v4jKmU94XvOPE5XJl0TftFadFbBKi:6BA/rdIGaRaB4ixLqvehU94Xr5XjGar

Score
10/10

Malware Config

Extracted

Family

gh0strat

C2

164.155.205.114

Targets

    • Target

      f5779045a4f8a31b8604d2c759ce710f217b99415ed57689c2b3f9946d8462bc

    • Size

      1.0MB

    • MD5

      b7f7eccc38bd334fd00d2e7d2f4b9c8f

    • SHA1

      7e5f9d367a3848c0ee1db0078c27083da6e96291

    • SHA256

      f5779045a4f8a31b8604d2c759ce710f217b99415ed57689c2b3f9946d8462bc

    • SHA512

      f8fbfc08d633b0739326491c96189c7cef4652f5bd2a12130c142174033f3623e74e53be1343dc4184d281133d53f3d9f1b20516e9d9cdb9728982a3d593c339

    • SSDEEP

      12288:6De4Fy/UQ0Vmu+X5IGasus/hP4ixLz1i7G8v4jKmU94XvOPE5XJl0TftFadFbBKi:6BA/rdIGaRaB4ixLqvehU94Xr5XjGar

    Score
    10/10
    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks