Resubmissions

21-05-2024 08:19

240521-j7zqwaed2x 10

General

  • Target

    677cea91ba7171d1a19f3c49d077db58bd66da053a190df60ac258a45407c48f

  • Size

    112KB

  • Sample

    240521-j7zqwaed2x

  • MD5

    27babb8977ca7f6a50282f43c3329633

  • SHA1

    7c91256b5b67bab5fb538f4c3890300d0c066fa5

  • SHA256

    677cea91ba7171d1a19f3c49d077db58bd66da053a190df60ac258a45407c48f

  • SHA512

    1e6fd61ca240a0be428e602c8e7d451a5446a83e03d2a15e418ee7a81ee2a3dad1d6d390e97983bf110d015b01698664590c63f1e66b658ac7d2e688024482a9

  • SSDEEP

    1536:vqEA70HzLJksPEOajozLElnqiO2ZdJ/tHi:vXTLJkQ7zAV3xtC

Malware Config

Extracted

Family

gh0strat

C2

dgz.se1f.cc

Targets

    • Target

      677cea91ba7171d1a19f3c49d077db58bd66da053a190df60ac258a45407c48f

    • Size

      112KB

    • MD5

      27babb8977ca7f6a50282f43c3329633

    • SHA1

      7c91256b5b67bab5fb538f4c3890300d0c066fa5

    • SHA256

      677cea91ba7171d1a19f3c49d077db58bd66da053a190df60ac258a45407c48f

    • SHA512

      1e6fd61ca240a0be428e602c8e7d451a5446a83e03d2a15e418ee7a81ee2a3dad1d6d390e97983bf110d015b01698664590c63f1e66b658ac7d2e688024482a9

    • SSDEEP

      1536:vqEA70HzLJksPEOajozLElnqiO2ZdJ/tHi:vXTLJkQ7zAV3xtC

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • RunningRat

      RunningRat is a remote access trojan first seen in 2018.

    • Sets DLL path for service in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Creates a Windows Service

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks