General

  • Target

    991ab695fa2cc9847d8c5b383ec68da2c91b06e1e169b4079abf5fc1c3d2d5b4

  • Size

    1012KB

  • Sample

    250125-q3c5msvpbt

  • MD5

    62a33979c72994636b33e540ef9bad43

  • SHA1

    ebf4077318879583a050d779bd53a6178cb5e74b

  • SHA256

    991ab695fa2cc9847d8c5b383ec68da2c91b06e1e169b4079abf5fc1c3d2d5b4

  • SHA512

    e83f7d8861b8db6ead6991c54bee78602c49dfe24c5dd89bf0202f9c1e126b93a84ff594e50e4d34e9fcf75b1e636a1b8338141777838c45e2ea3e62952e4cd1

  • SSDEEP

    24576:2YWHDaw5/sRwYkVrHHz+mWkXwHl8xHj8oKS6uXk4uK+5QpHqw5:2swuPkRTrzXcix8ekSdj

Malware Config

Targets

    • Target

      991ab695fa2cc9847d8c5b383ec68da2c91b06e1e169b4079abf5fc1c3d2d5b4

    • Size

      1012KB

    • MD5

      62a33979c72994636b33e540ef9bad43

    • SHA1

      ebf4077318879583a050d779bd53a6178cb5e74b

    • SHA256

      991ab695fa2cc9847d8c5b383ec68da2c91b06e1e169b4079abf5fc1c3d2d5b4

    • SHA512

      e83f7d8861b8db6ead6991c54bee78602c49dfe24c5dd89bf0202f9c1e126b93a84ff594e50e4d34e9fcf75b1e636a1b8338141777838c45e2ea3e62952e4cd1

    • SSDEEP

      24576:2YWHDaw5/sRwYkVrHHz+mWkXwHl8xHj8oKS6uXk4uK+5QpHqw5:2swuPkRTrzXcix8ekSdj

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks