General

  • Target

    7d553f225dc9bd6a31d4f1c36a1531dc5cbce295bab80a5857420beff2cf54e8

  • Size

    12.9MB

  • Sample

    240525-tkp82aae24

  • MD5

    f57575642e162b812721afe083ee8398

  • SHA1

    81848911863bed5e2a1cabe5193aed071cd5910d

  • SHA256

    7d553f225dc9bd6a31d4f1c36a1531dc5cbce295bab80a5857420beff2cf54e8

  • SHA512

    fac0036f6206d12ca78ec8f5673c433cd9ceb7c7bb4bff7d0300e355bdf4d0f92bd0437abe33e0b53ac3bfab8df2c6219dda3258f79ac744d47b24f28b2ab61b

  • SSDEEP

    196608:b75bAxEXHYN8r1j8Uu3glpFRX9eDo0TSrow3P9R+EwVEzufFb:f5bAxEXtZoj3wRtWoHl3P7teE6b

Malware Config

Targets

    • Target

      7d553f225dc9bd6a31d4f1c36a1531dc5cbce295bab80a5857420beff2cf54e8

    • Size

      12.9MB

    • MD5

      f57575642e162b812721afe083ee8398

    • SHA1

      81848911863bed5e2a1cabe5193aed071cd5910d

    • SHA256

      7d553f225dc9bd6a31d4f1c36a1531dc5cbce295bab80a5857420beff2cf54e8

    • SHA512

      fac0036f6206d12ca78ec8f5673c433cd9ceb7c7bb4bff7d0300e355bdf4d0f92bd0437abe33e0b53ac3bfab8df2c6219dda3258f79ac744d47b24f28b2ab61b

    • SSDEEP

      196608:b75bAxEXHYN8r1j8Uu3glpFRX9eDo0TSrow3P9R+EwVEzufFb:f5bAxEXtZoj3wRtWoHl3P7teE6b

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Sets DLL path for service in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks