General

  • Target

    614962e0a470f324fe4105cf236077f01ef16a0a5168ee7870bd036eb6d984dc

  • Size

    388KB

  • Sample

    240427-mb2gdahb3y

  • MD5

    9840a6055f1bb6cd44fb13385a4e18f4

  • SHA1

    240e56011130319a72b2448fd341a0cc40b9b3fa

  • SHA256

    614962e0a470f324fe4105cf236077f01ef16a0a5168ee7870bd036eb6d984dc

  • SHA512

    c90f61ad5d2617d9123caab8e40622f5ac7de58dcc5361863577ee0e72a2bf60209d7a6d1422bae833633c870794c2392fd17e125396a280e4107c2c629f6b07

  • SSDEEP

    3072:KTK/yLrQbWaR5Qax8c/YtG2Ygn4HP0xBShkpJZCpphe7cWQII0yJ:KiyLEbWaR5CcR7c6hkpTZiJ

Malware Config

Targets

    • Target

      614962e0a470f324fe4105cf236077f01ef16a0a5168ee7870bd036eb6d984dc

    • Size

      388KB

    • MD5

      9840a6055f1bb6cd44fb13385a4e18f4

    • SHA1

      240e56011130319a72b2448fd341a0cc40b9b3fa

    • SHA256

      614962e0a470f324fe4105cf236077f01ef16a0a5168ee7870bd036eb6d984dc

    • SHA512

      c90f61ad5d2617d9123caab8e40622f5ac7de58dcc5361863577ee0e72a2bf60209d7a6d1422bae833633c870794c2392fd17e125396a280e4107c2c629f6b07

    • SSDEEP

      3072:KTK/yLrQbWaR5Qax8c/YtG2Ygn4HP0xBShkpJZCpphe7cWQII0yJ:KiyLEbWaR5CcR7c6hkpTZiJ

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Executes dropped EXE

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks