General

  • Target

    4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe

  • Size

    348KB

  • Sample

    241114-f6m4xaveme

  • MD5

    b9befe5cf8c341b816fcd1922accf117

  • SHA1

    08ca40d0fc0c580caeb6c15aa5289bef223dd6d4

  • SHA256

    4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d

  • SHA512

    3e85b180156fd665618fca532f4588f9edb9935fe2ecf3ebd60621a974c8fd30e32adee3a5d36c8bdefbec05787d69e721a13ade542f6d372681c4c80e448cac

  • SSDEEP

    6144:MJueTkwOwoWOQ3dwaWB28edeP/deUv80P80Ap8UGwoTGHZOWJkqd0K4rG7eVT0SQ:ouLwoZQGpnedeP/deUe1ppGjTGHZRT08

Malware Config

Targets

    • Target

      4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe

    • Size

      348KB

    • MD5

      b9befe5cf8c341b816fcd1922accf117

    • SHA1

      08ca40d0fc0c580caeb6c15aa5289bef223dd6d4

    • SHA256

      4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d

    • SHA512

      3e85b180156fd665618fca532f4588f9edb9935fe2ecf3ebd60621a974c8fd30e32adee3a5d36c8bdefbec05787d69e721a13ade542f6d372681c4c80e448cac

    • SSDEEP

      6144:MJueTkwOwoWOQ3dwaWB28edeP/deUv80P80Ap8UGwoTGHZOWJkqd0K4rG7eVT0SQ:ouLwoZQGpnedeP/deUe1ppGjTGHZRT08

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks