General

  • Target

    04032025_0120_03032025_关于2025员工工资调整详情.rar

  • Size

    185KB

  • Sample

    250304-bp5keavxbz

  • MD5

    ca4e76833746f6b84dab7cd435944f6c

  • SHA1

    4ab0c2144abf8fc932970086995c9098beb12a22

  • SHA256

    8a37b2565a4b84a2111d496be9557936845242cd35e94ed7ad4947bd89ecdbab

  • SHA512

    a43a06d7b0ace418d64b73bc2a253be7509429105141d35c6a064154488a3e227b86a147cdc9e3df13f920bc7c3ffc402256f8ae8c237370f8b3dd2f509a6ecc

  • SSDEEP

    3072:FTSKzAZSa9+XrtmK37G/Wtffx399W6+lJvOFxttwOp3gWjGh8HFlFqgQ3ooF:MKHHG/WtR3G6wGXwOp3b88LrQ3oG

Malware Config

Targets

    • Target

      关于2025员工工资调整详情.scr

    • Size

      211KB

    • MD5

      c104dce7ac77b6154e5235e8bf0ecd19

    • SHA1

      64d2165f1ecb6c68358592c65e29caf68937386a

    • SHA256

      e41b8ea141681fb21c0a4bcf6af20529249e1637a3af9f46a68899e8e39f1b86

    • SHA512

      249d4f5e8c3475a9bb4a735eca8c47c8758470645a43ebaf3899c2f30d2c79a293064ee563dfe7c3a54d3c24daaa28128cd9df10a6b74bd1b9cf562e388be744

    • SSDEEP

      3072:dRsxM0KfuUfBbG6996HM0XU+aDe5UEGJSKz7ccRJMM3Ojl5My3LSEA0QchHnNt4f:dOzSG6hn+aCyIK3ccnMxjRA0Qchtivn

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks