General

  • Target

    869fb8c91e0abac625d7fd8175458b79ff3aa90a87e7f4933476b3b5d099f31f

  • Size

    160KB

  • Sample

    250304-xs6grsylw6

  • MD5

    57f8bdc09e5c1ab7c2776f0d27db9614

  • SHA1

    487f7c06795f193ea253dc4ebd293f47164149a1

  • SHA256

    869fb8c91e0abac625d7fd8175458b79ff3aa90a87e7f4933476b3b5d099f31f

  • SHA512

    4308e53862b5a5b6a726b876fc193815a86b7400fae579dc88a334b8ba43b23b9b224c97038d040f0086960bfd49d75db6b464aa06beca29cbb2ec587aab5822

  • SSDEEP

    3072:dhPm77B1ZDwB76mVlZ9FArVf0SA3MG5vY:vWd1ZDg7HXArVf65vY

Score
10/10

Malware Config

Targets

    • Target

      869fb8c91e0abac625d7fd8175458b79ff3aa90a87e7f4933476b3b5d099f31f

    • Size

      160KB

    • MD5

      57f8bdc09e5c1ab7c2776f0d27db9614

    • SHA1

      487f7c06795f193ea253dc4ebd293f47164149a1

    • SHA256

      869fb8c91e0abac625d7fd8175458b79ff3aa90a87e7f4933476b3b5d099f31f

    • SHA512

      4308e53862b5a5b6a726b876fc193815a86b7400fae579dc88a334b8ba43b23b9b224c97038d040f0086960bfd49d75db6b464aa06beca29cbb2ec587aab5822

    • SSDEEP

      3072:dhPm77B1ZDwB76mVlZ9FArVf0SA3MG5vY:vWd1ZDg7HXArVf65vY

    Score
    10/10
    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks