General

  • Target

    2290e49cb4f0baca2224515eb98da13020a1908a383568b8143b15f22ab585b1

  • Size

    3.6MB

  • Sample

    240526-hlx5gsad9y

  • MD5

    9c666bb4769d6485707b3ba994cddc3e

  • SHA1

    59135d9714b2bfa4aab38f8a5607cf1c1339e8c3

  • SHA256

    2290e49cb4f0baca2224515eb98da13020a1908a383568b8143b15f22ab585b1

  • SHA512

    4045e39f4c630ed59aca594d969a4e2f103fdc723316232d67cbe7bb30acebc90d1d8881200bf29b078a7f4567b6f8a49ef1df1e8ab4136d41ffa68761cf837c

  • SSDEEP

    49152:TYREXSVMDi3FFT5yCO95xIzWAL/4EfZ4ZYcWf0dwTwgr6dup:c2SVMD8Fp5VL/4EkWf0dw1r6dup

Malware Config

Targets

    • Target

      2290e49cb4f0baca2224515eb98da13020a1908a383568b8143b15f22ab585b1

    • Size

      3.6MB

    • MD5

      9c666bb4769d6485707b3ba994cddc3e

    • SHA1

      59135d9714b2bfa4aab38f8a5607cf1c1339e8c3

    • SHA256

      2290e49cb4f0baca2224515eb98da13020a1908a383568b8143b15f22ab585b1

    • SHA512

      4045e39f4c630ed59aca594d969a4e2f103fdc723316232d67cbe7bb30acebc90d1d8881200bf29b078a7f4567b6f8a49ef1df1e8ab4136d41ffa68761cf837c

    • SSDEEP

      49152:TYREXSVMDi3FFT5yCO95xIzWAL/4EfZ4ZYcWf0dwTwgr6dup:c2SVMD8Fp5VL/4EkWf0dw1r6dup

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Sets DLL path for service in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks