General

  • Target

    f846700167cb0019a953576fac6ba2efd5ad146c9ae2d919b85f94e2a2b360b7

  • Size

    12.9MB

  • Sample

    240525-w1fqmsdd2w

  • MD5

    d4941233299fe726ff9923e4401fc257

  • SHA1

    9c3e1d96f5a85d8ccb0d2aa654c8434cfbb9a62e

  • SHA256

    f846700167cb0019a953576fac6ba2efd5ad146c9ae2d919b85f94e2a2b360b7

  • SHA512

    39809f26d5fbc46ef5438ec084237a550a300d2105ed81345527278880a0711cf5661d65395c4874765936b507092a6670b08ec37793a4762ad4725c16c8cc35

  • SSDEEP

    196608:bz5bAxEXHRN8r1jKe6LKi3CkPPxXRML8AeblmRUewVEau7F6:v5bAxEXgZme6RykXFhTbAeEb6

Malware Config

Targets

    • Target

      f846700167cb0019a953576fac6ba2efd5ad146c9ae2d919b85f94e2a2b360b7

    • Size

      12.9MB

    • MD5

      d4941233299fe726ff9923e4401fc257

    • SHA1

      9c3e1d96f5a85d8ccb0d2aa654c8434cfbb9a62e

    • SHA256

      f846700167cb0019a953576fac6ba2efd5ad146c9ae2d919b85f94e2a2b360b7

    • SHA512

      39809f26d5fbc46ef5438ec084237a550a300d2105ed81345527278880a0711cf5661d65395c4874765936b507092a6670b08ec37793a4762ad4725c16c8cc35

    • SSDEEP

      196608:bz5bAxEXHRN8r1jKe6LKi3CkPPxXRML8AeblmRUewVEau7F6:v5bAxEXgZme6RykXFhTbAeEb6

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Sets DLL path for service in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks