General

  • Target

    43de2e460114511b95976b1497fd9e4aed988dc18613f21a6b35e33b348bc57d

  • Size

    618KB

  • Sample

    250301-2f2ehavnz3

  • MD5

    12f9cf2345cb81a928c27c11d837959e

  • SHA1

    f6eb420ca7b062413e58dc5e87e4bfe5cacc2bbf

  • SHA256

    43de2e460114511b95976b1497fd9e4aed988dc18613f21a6b35e33b348bc57d

  • SHA512

    0560277f3760a4563ade7dffa5197978733ea0b0d79d9b79f5074424d21dd9b61c12c7942fffd9342c0dc940c5e67a8557b26ec7948b95b897d13591ac09fd91

  • SSDEEP

    12288:EVRTE3het1yJh2HduH7GqjTyiVRTE3het1yJh2HduH7GqjTy:IX1AwHsH7hTyOX1AwHsH7hTy

Malware Config

Extracted

Family

gh0strat

C2

98.126.162.38:3201

http://98.126.162.36:803/

http://98.126.162.37:805/index.php

Attributes
  • user_agent

    Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C))

    Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)

Targets

    • Target

      43de2e460114511b95976b1497fd9e4aed988dc18613f21a6b35e33b348bc57d

    • Size

      618KB

    • MD5

      12f9cf2345cb81a928c27c11d837959e

    • SHA1

      f6eb420ca7b062413e58dc5e87e4bfe5cacc2bbf

    • SHA256

      43de2e460114511b95976b1497fd9e4aed988dc18613f21a6b35e33b348bc57d

    • SHA512

      0560277f3760a4563ade7dffa5197978733ea0b0d79d9b79f5074424d21dd9b61c12c7942fffd9342c0dc940c5e67a8557b26ec7948b95b897d13591ac09fd91

    • SSDEEP

      12288:EVRTE3het1yJh2HduH7GqjTyiVRTE3het1yJh2HduH7GqjTy:IX1AwHsH7hTyOX1AwHsH7hTy

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks