General

  • Target

    ghostcheat.exe

  • Size

    10.0MB

  • Sample

    241020-1k9e8stdkq

  • MD5

    249a1f67c978836ecb8befc961b68a24

  • SHA1

    df65e1866385c19420b5e1559e0f07c4d9450723

  • SHA256

    0afde0fdb0c168deb5561cfbfa8ea5a09d99d03a9de33ed6cd35fdd935bf9a21

  • SHA512

    4cb1192b54a85f8fe6b7311ed15639c2b2c683834fd50f018b1c9fa31c322f5471c73c7c346b7714130f29470f4cdcb5343a3d0c3325a33f34b8f022ac893273

  • SSDEEP

    196608:U/FhteN/FJMIDJf0gsAGK5SEQRquAK3n4Io:WW/Fqyf0gsfNtAK4

Malware Config

Targets

    • Target

      ghostcheat.exe

    • Size

      10.0MB

    • MD5

      249a1f67c978836ecb8befc961b68a24

    • SHA1

      df65e1866385c19420b5e1559e0f07c4d9450723

    • SHA256

      0afde0fdb0c168deb5561cfbfa8ea5a09d99d03a9de33ed6cd35fdd935bf9a21

    • SHA512

      4cb1192b54a85f8fe6b7311ed15639c2b2c683834fd50f018b1c9fa31c322f5471c73c7c346b7714130f29470f4cdcb5343a3d0c3325a33f34b8f022ac893273

    • SSDEEP

      196608:U/FhteN/FJMIDJf0gsAGK5SEQRquAK3n4Io:WW/Fqyf0gsfNtAK4

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks