General

  • Target

    fb7e2bc1584c40e95e9343f8f284fd0583baa7af61087ea598c284276529c442

  • Size

    8.0MB

  • Sample

    240526-memgmaff75

  • MD5

    bdd07d338718da10d4e222758e4cc43b

  • SHA1

    0feb2937bce4b869ca8e45eb8057fd5e1f4d78ab

  • SHA256

    fb7e2bc1584c40e95e9343f8f284fd0583baa7af61087ea598c284276529c442

  • SHA512

    9e4af92c220c66974a99ad423bf590946908fa7f80fccaa1fdb294ccf017389bab9be9173ad7a7ef217cfd253ff98c55fcc1a329ac00200f020a61208fd6e266

  • SSDEEP

    98304:22SVMK8dWro2mCHer41qIJVUR0LRn2ufOFL//bHAKYmg77UQ1mfa/ews4VOp9mD:2254wIY0LRnHfq37g7oQcfa/ewsWOpsD

Malware Config

Targets

    • Target

      fb7e2bc1584c40e95e9343f8f284fd0583baa7af61087ea598c284276529c442

    • Size

      8.0MB

    • MD5

      bdd07d338718da10d4e222758e4cc43b

    • SHA1

      0feb2937bce4b869ca8e45eb8057fd5e1f4d78ab

    • SHA256

      fb7e2bc1584c40e95e9343f8f284fd0583baa7af61087ea598c284276529c442

    • SHA512

      9e4af92c220c66974a99ad423bf590946908fa7f80fccaa1fdb294ccf017389bab9be9173ad7a7ef217cfd253ff98c55fcc1a329ac00200f020a61208fd6e266

    • SSDEEP

      98304:22SVMK8dWro2mCHer41qIJVUR0LRn2ufOFL//bHAKYmg77UQ1mfa/ews4VOp9mD:2254wIY0LRnHfq37g7oQcfa/ewsWOpsD

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Sets DLL path for service in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks