General

  • Target

    7c728b157e51e173d45d7dd27afca535cadb55a37d5f0b0a807bdc5c3b870abc

  • Size

    676KB

  • Sample

    241110-zlmr7avcmp

  • MD5

    22b46a5d1cac7a683b8cb88c44a87a9e

  • SHA1

    6fb16d13688baab44e8832892e8c27bb01a00597

  • SHA256

    7c728b157e51e173d45d7dd27afca535cadb55a37d5f0b0a807bdc5c3b870abc

  • SHA512

    eb9f1b55997b806081c9dcbbac08f9f2df79dff5ea5954fbd0e9befdd207aba691d2f234e26de4d2fb3cde22a3e645845773cd7e534275da31619b38da775370

  • SSDEEP

    6144:jPi+8sCE1c5V7IcIuRl4R9cd+z1kWS+rd0B4nKvKi9pH3RwoQisIO0A:zi+Z1w7Icbl4ROdg9i9pXc

Score
10/10

Malware Config

Targets

    • Target

      7c728b157e51e173d45d7dd27afca535cadb55a37d5f0b0a807bdc5c3b870abc

    • Size

      676KB

    • MD5

      22b46a5d1cac7a683b8cb88c44a87a9e

    • SHA1

      6fb16d13688baab44e8832892e8c27bb01a00597

    • SHA256

      7c728b157e51e173d45d7dd27afca535cadb55a37d5f0b0a807bdc5c3b870abc

    • SHA512

      eb9f1b55997b806081c9dcbbac08f9f2df79dff5ea5954fbd0e9befdd207aba691d2f234e26de4d2fb3cde22a3e645845773cd7e534275da31619b38da775370

    • SSDEEP

      6144:jPi+8sCE1c5V7IcIuRl4R9cd+z1kWS+rd0B4nKvKi9pH3RwoQisIO0A:zi+Z1w7Icbl4ROdg9i9pXc

    Score
    10/10
    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks