General

  • Target

    202409124c673a61f0f496103c92bbb4d964f2dehijackloadericedid

  • Size

    4.5MB

  • Sample

    240912-g2xcfsvgkr

  • MD5

    4c673a61f0f496103c92bbb4d964f2de

  • SHA1

    765a793933e45696ef39a32762761398ebe2abad

  • SHA256

    4657d01bcb465e9f8504dd5a615defe3d99e6c62ed87ee04d1af82881feff9af

  • SHA512

    9f28e96ddc65d36e79cab258d270b1e2f07de79ec5e7ba6d58cfb499475a628798955a1bb678e6b40f9f6399d2e01b410fa4fcd1463b1816095f9de31af34d74

  • SSDEEP

    49152:/YREXSVMKi3OpbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8b8ITDnl27PL:A2SVMK8OpbXsPN5kiQaZ56

Malware Config

Targets

    • Target

      202409124c673a61f0f496103c92bbb4d964f2dehijackloadericedid

    • Size

      4.5MB

    • MD5

      4c673a61f0f496103c92bbb4d964f2de

    • SHA1

      765a793933e45696ef39a32762761398ebe2abad

    • SHA256

      4657d01bcb465e9f8504dd5a615defe3d99e6c62ed87ee04d1af82881feff9af

    • SHA512

      9f28e96ddc65d36e79cab258d270b1e2f07de79ec5e7ba6d58cfb499475a628798955a1bb678e6b40f9f6399d2e01b410fa4fcd1463b1816095f9de31af34d74

    • SSDEEP

      49152:/YREXSVMKi3OpbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8b8ITDnl27PL:A2SVMK8OpbXsPN5kiQaZ56

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Server Software Component: Terminal Services DLL

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks