General

  • Target

    ExeFile (20).exe

  • Size

    112KB

  • Sample

    240820-q75qfsvgje

  • MD5

    376f65c925a7319f88beee5075cfa944

  • SHA1

    c4e6099c945fb3a686f0a5f32108f3ca1334d3be

  • SHA256

    223278e7f27613207535c392734433b4413da28fe44e43c89c2379475430f67d

  • SHA512

    1bcde068e944f698ef3ef93804c525c118854873011b7c2435bbb0a6db5be0d1b56cf99e1d6de42460cd76056dd215e83442a6791ee8b3c3f3a246b113a90f14

  • SSDEEP

    1536:vqEA70HzLJksPEOajozLElnqiO2HdJ/tHi:vXTLJkQ7zAV37tC

Malware Config

Targets

    • Target

      ExeFile (20).exe

    • Size

      112KB

    • MD5

      376f65c925a7319f88beee5075cfa944

    • SHA1

      c4e6099c945fb3a686f0a5f32108f3ca1334d3be

    • SHA256

      223278e7f27613207535c392734433b4413da28fe44e43c89c2379475430f67d

    • SHA512

      1bcde068e944f698ef3ef93804c525c118854873011b7c2435bbb0a6db5be0d1b56cf99e1d6de42460cd76056dd215e83442a6791ee8b3c3f3a246b113a90f14

    • SSDEEP

      1536:vqEA70HzLJksPEOajozLElnqiO2HdJ/tHi:vXTLJkQ7zAV37tC

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Server Software Component: Terminal Services DLL

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Creates a Windows Service

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks