General

  • Target

    e5a0229023367e7df37335bdcbf1edae0fd6365c8e927d4e82cca346f26cf0b7

  • Size

    4.5MB

  • Sample

    240524-d63hgsbf3z

  • MD5

    83f930e3015278142aacbb706819f36d

  • SHA1

    cc53fb7c18f32c707850b2bfefe19ab033a6c29b

  • SHA256

    e5a0229023367e7df37335bdcbf1edae0fd6365c8e927d4e82cca346f26cf0b7

  • SHA512

    7ad621bd05c168dc2ef8520c7c2d0f20c74c32815667607104e856c9284963c7827f509efc498b25cd0dce29078ce3e548068446c08e3e6f51b1c8b3b33726bb

  • SSDEEP

    49152:1YREXSVMDi3cEqbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8b8ITDnl27z:a2SVMD8cEqbXsPN5kiQaZ56

Malware Config

Targets

    • Target

      e5a0229023367e7df37335bdcbf1edae0fd6365c8e927d4e82cca346f26cf0b7

    • Size

      4.5MB

    • MD5

      83f930e3015278142aacbb706819f36d

    • SHA1

      cc53fb7c18f32c707850b2bfefe19ab033a6c29b

    • SHA256

      e5a0229023367e7df37335bdcbf1edae0fd6365c8e927d4e82cca346f26cf0b7

    • SHA512

      7ad621bd05c168dc2ef8520c7c2d0f20c74c32815667607104e856c9284963c7827f509efc498b25cd0dce29078ce3e548068446c08e3e6f51b1c8b3b33726bb

    • SSDEEP

      49152:1YREXSVMDi3cEqbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8b8ITDnl27z:a2SVMD8cEqbXsPN5kiQaZ56

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Sets DLL path for service in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks