General
-
Target
1c50bafd6def9ad28bc614e32f7c9581322625240c18d487ab900208013c3144
-
Size
15.4MB
-
Sample
240927-r7q3qszere
-
MD5
a5cd1a54ebdd40b3376e457c43c9e543
-
SHA1
387fefefd8c2edb54975d82cc41179bbbb51b1c8
-
SHA256
1c50bafd6def9ad28bc614e32f7c9581322625240c18d487ab900208013c3144
-
SHA512
18f35ddd8bc30b22f33e1bddc0c91184dfa45da5a456cd1035d031415298a67eafbb70aab16ec01b4e8cb10bcb081242bc9c9746b1eadb868117bbdd6fc7415c
-
SSDEEP
196608:kKXbeO73bL3rUP1Luepkfw5jmBbyKMdCSTkGE7nWoRPep3q:V7LXyieJ5KBGJCBGNoBes
Static task
static1
Behavioral task
behavioral1
Sample
1c50bafd6def9ad28bc614e32f7c9581322625240c18d487ab900208013c3144.exe
Resource
win7-20240903-en
Malware Config
Extracted
gh0strat
tongxiu.e2.luyouxia.net
Targets
-
-
Target
1c50bafd6def9ad28bc614e32f7c9581322625240c18d487ab900208013c3144
-
Size
15.4MB
-
MD5
a5cd1a54ebdd40b3376e457c43c9e543
-
SHA1
387fefefd8c2edb54975d82cc41179bbbb51b1c8
-
SHA256
1c50bafd6def9ad28bc614e32f7c9581322625240c18d487ab900208013c3144
-
SHA512
18f35ddd8bc30b22f33e1bddc0c91184dfa45da5a456cd1035d031415298a67eafbb70aab16ec01b4e8cb10bcb081242bc9c9746b1eadb868117bbdd6fc7415c
-
SSDEEP
196608:kKXbeO73bL3rUP1Luepkfw5jmBbyKMdCSTkGE7nWoRPep3q:V7LXyieJ5KBGJCBGNoBes
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2