General

  • Target

    2025.scr.v

  • Size

    211KB

  • Sample

    250303-db5z5avlt4

  • MD5

    c104dce7ac77b6154e5235e8bf0ecd19

  • SHA1

    64d2165f1ecb6c68358592c65e29caf68937386a

  • SHA256

    e41b8ea141681fb21c0a4bcf6af20529249e1637a3af9f46a68899e8e39f1b86

  • SHA512

    249d4f5e8c3475a9bb4a735eca8c47c8758470645a43ebaf3899c2f30d2c79a293064ee563dfe7c3a54d3c24daaa28128cd9df10a6b74bd1b9cf562e388be744

  • SSDEEP

    3072:dRsxM0KfuUfBbG6996HM0XU+aDe5UEGJSKz7ccRJMM3Ojl5My3LSEA0QchHnNt4f:dOzSG6hn+aCyIK3ccnMxjRA0Qchtivn

Malware Config

Targets

    • Target

      2025.scr.v

    • Size

      211KB

    • MD5

      c104dce7ac77b6154e5235e8bf0ecd19

    • SHA1

      64d2165f1ecb6c68358592c65e29caf68937386a

    • SHA256

      e41b8ea141681fb21c0a4bcf6af20529249e1637a3af9f46a68899e8e39f1b86

    • SHA512

      249d4f5e8c3475a9bb4a735eca8c47c8758470645a43ebaf3899c2f30d2c79a293064ee563dfe7c3a54d3c24daaa28128cd9df10a6b74bd1b9cf562e388be744

    • SSDEEP

      3072:dRsxM0KfuUfBbG6996HM0XU+aDe5UEGJSKz7ccRJMM3Ojl5My3LSEA0QchHnNt4f:dOzSG6hn+aCyIK3ccnMxjRA0Qchtivn

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks