General

  • Target

    ff4967aa2cefcb0628fdc68040621351b14ea20b28a339b42e57cd3c4f35e7ff

  • Size

    1.3MB

  • Sample

    250125-r7j97axmcx

  • MD5

    55645546b1914c2701df42bc676bd482

  • SHA1

    9e53f78f1b7eb9e5fd47114e5e77738a58e5abdb

  • SHA256

    ff4967aa2cefcb0628fdc68040621351b14ea20b28a339b42e57cd3c4f35e7ff

  • SHA512

    d643f34610417a95a9bebe0b95ee1efcc408c4974b7ddb3a3e864c6e5f39744f79b316cd5b187425b13e6d08eefa7d1900d4bf2037507652c00bee599444adb4

  • SSDEEP

    24576:Uh4cQjmoXnx/Oz+lOTKOHsQlr7K6WVZ6GwuwTbhEkA7u9:UqEqlZlOe/1bwvTbhE5y

Malware Config

Targets

    • Target

      ff4967aa2cefcb0628fdc68040621351b14ea20b28a339b42e57cd3c4f35e7ff

    • Size

      1.3MB

    • MD5

      55645546b1914c2701df42bc676bd482

    • SHA1

      9e53f78f1b7eb9e5fd47114e5e77738a58e5abdb

    • SHA256

      ff4967aa2cefcb0628fdc68040621351b14ea20b28a339b42e57cd3c4f35e7ff

    • SHA512

      d643f34610417a95a9bebe0b95ee1efcc408c4974b7ddb3a3e864c6e5f39744f79b316cd5b187425b13e6d08eefa7d1900d4bf2037507652c00bee599444adb4

    • SSDEEP

      24576:Uh4cQjmoXnx/Oz+lOTKOHsQlr7K6WVZ6GwuwTbhEkA7u9:UqEqlZlOe/1bwvTbhE5y

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks