General

  • Target

    60ec58f5b707caacc5c469519a0c3b60N.exe

  • Size

    348KB

  • Sample

    240806-fpp7yazgmk

  • MD5

    60ec58f5b707caacc5c469519a0c3b60

  • SHA1

    15c0c01b07c32d7fe52c5084c4e8cb94c52b3515

  • SHA256

    ef847e455aea6bbcba041b0e0f7fdffcd093fd423f3f89c2960c2ec1c5a0d905

  • SHA512

    8cfc6c25dde56afe940e9584cc8f5d6d15949590db8c4bcac64f5942c3d1f7685fc81bded0ffa679f70c6b80c3b16a78ee0c34fd9e6df1e1f3ce6b2af2e626a4

  • SSDEEP

    6144:MJueTkwOwoWOQ3dwaWB28edeP/deUv80P80Ap8UGwoTGHZOWJkqd0K4rG7eVT0Ss:ouLwoZQGpnedeP/deUe1ppGjTGHZRT0w

Malware Config

Targets

    • Target

      60ec58f5b707caacc5c469519a0c3b60N.exe

    • Size

      348KB

    • MD5

      60ec58f5b707caacc5c469519a0c3b60

    • SHA1

      15c0c01b07c32d7fe52c5084c4e8cb94c52b3515

    • SHA256

      ef847e455aea6bbcba041b0e0f7fdffcd093fd423f3f89c2960c2ec1c5a0d905

    • SHA512

      8cfc6c25dde56afe940e9584cc8f5d6d15949590db8c4bcac64f5942c3d1f7685fc81bded0ffa679f70c6b80c3b16a78ee0c34fd9e6df1e1f3ce6b2af2e626a4

    • SSDEEP

      6144:MJueTkwOwoWOQ3dwaWB28edeP/deUv80P80Ap8UGwoTGHZOWJkqd0K4rG7eVT0Ss:ouLwoZQGpnedeP/deUe1ppGjTGHZRT0w

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks