General

  • Target

    0139422358150eda3958945b70568121b7037e50a0968e2a1c978f7c309aa318

  • Size

    348KB

  • Sample

    240722-wpwbyszhrq

  • MD5

    cafdd4962dd00ff3d59b0481bef83c78

  • SHA1

    bc9da8b3decb86edfbc3c5eab6ac8c40543ee814

  • SHA256

    0139422358150eda3958945b70568121b7037e50a0968e2a1c978f7c309aa318

  • SHA512

    29063753a504f46343c917040de19640751bf47d0e36012e0e5eb18a87c868d6ac6c35faf500e95220578e89a907cff2c6f291f71277ceb72055ee9c6a02b6fb

  • SSDEEP

    6144:MJueTkwOwoWOQ3dwaWB28edeP/deUv80P80Ap8UGwoTGHZOWJkqd0K4rG7eVT0SX:ouLwoZQGpnedeP/deUe1ppGjTGHZRT0z

Malware Config

Targets

    • Target

      0139422358150eda3958945b70568121b7037e50a0968e2a1c978f7c309aa318

    • Size

      348KB

    • MD5

      cafdd4962dd00ff3d59b0481bef83c78

    • SHA1

      bc9da8b3decb86edfbc3c5eab6ac8c40543ee814

    • SHA256

      0139422358150eda3958945b70568121b7037e50a0968e2a1c978f7c309aa318

    • SHA512

      29063753a504f46343c917040de19640751bf47d0e36012e0e5eb18a87c868d6ac6c35faf500e95220578e89a907cff2c6f291f71277ceb72055ee9c6a02b6fb

    • SSDEEP

      6144:MJueTkwOwoWOQ3dwaWB28edeP/deUv80P80Ap8UGwoTGHZOWJkqd0K4rG7eVT0SX:ouLwoZQGpnedeP/deUe1ppGjTGHZRT0z

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks