General

  • Target

    0ebfef7d6059b82e87e05a54e80e5a7b.virus

  • Size

    2.6MB

  • Sample

    240916-yw6sdaxemh

  • MD5

    0ebfef7d6059b82e87e05a54e80e5a7b

  • SHA1

    3c1ab9c072625b9e08b72013967b04bd2e0cb69e

  • SHA256

    4695fbf41abd54d1449d8da4a5976d50aec0499e3e2959e20686237d32db3114

  • SHA512

    a695816e77c3d569ba861fab022035910858cf2db0e15dd2a58398c6f39394add35172ca209de1d0d02019f5f0a4f35beb8e3ea56c4e0c37cb645379d1d9e5c9

  • SSDEEP

    24576:3bsATQUIP6braCWyv6BpHv+LOez9OulOcsV9DK2J2aBcpsam5RvikgJkf:3vbDCv+HOulOcQMYYsP5RviP6

Malware Config

Targets

    • Target

      0ebfef7d6059b82e87e05a54e80e5a7b.virus

    • Size

      2.6MB

    • MD5

      0ebfef7d6059b82e87e05a54e80e5a7b

    • SHA1

      3c1ab9c072625b9e08b72013967b04bd2e0cb69e

    • SHA256

      4695fbf41abd54d1449d8da4a5976d50aec0499e3e2959e20686237d32db3114

    • SHA512

      a695816e77c3d569ba861fab022035910858cf2db0e15dd2a58398c6f39394add35172ca209de1d0d02019f5f0a4f35beb8e3ea56c4e0c37cb645379d1d9e5c9

    • SSDEEP

      24576:3bsATQUIP6braCWyv6BpHv+LOez9OulOcsV9DK2J2aBcpsam5RvikgJkf:3vbDCv+HOulOcQMYYsP5RviP6

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • UAC bypass

    • OS Credential Dumping: LSASS Memory

      Malicious access to Credentials History.

    • mimikatz is an open source tool to dump credentials on Windows

    • Blocklisted process makes network request

    • Server Software Component: Terminal Services DLL

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Enterprise v15

Tasks