General

  • Target

    840b98c84a29f27652d5137711aff08a43b6e5ec970281c88496f112554e99a9

  • Size

    7.6MB

  • Sample

    240525-vbtqjabe23

  • MD5

    bcb245805312ff3e6bee65fb0aaa9d63

  • SHA1

    d9ff12327e9c7631139141d426baa3f6863573fc

  • SHA256

    840b98c84a29f27652d5137711aff08a43b6e5ec970281c88496f112554e99a9

  • SHA512

    e7dca09a29f17fc377e0dc33d51abf47fbba9b12a60bafec49ada4b0ebb0ac77d0062bedb612fd9310da6733e9bf4a5e457ce878e7e4cb01d393117559e53a78

  • SSDEEP

    98304:Z2SVMD8txqJbc5xtz+kl/m5lifMc/PKkuExnaZ/l+7Y1rtJKCg85:R7sJk+y/mnifVKkbaZ/l+7Y1rtECg85

Malware Config

Targets

    • Target

      840b98c84a29f27652d5137711aff08a43b6e5ec970281c88496f112554e99a9

    • Size

      7.6MB

    • MD5

      bcb245805312ff3e6bee65fb0aaa9d63

    • SHA1

      d9ff12327e9c7631139141d426baa3f6863573fc

    • SHA256

      840b98c84a29f27652d5137711aff08a43b6e5ec970281c88496f112554e99a9

    • SHA512

      e7dca09a29f17fc377e0dc33d51abf47fbba9b12a60bafec49ada4b0ebb0ac77d0062bedb612fd9310da6733e9bf4a5e457ce878e7e4cb01d393117559e53a78

    • SSDEEP

      98304:Z2SVMD8txqJbc5xtz+kl/m5lifMc/PKkuExnaZ/l+7Y1rtJKCg85:R7sJk+y/mnifVKkbaZ/l+7Y1rtECg85

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Sets DLL path for service in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks