General

  • Target

    61ff4410523695a2e6bb9fbc100519c05bf552549d72611e64435e721a926e67

  • Size

    10.0MB

  • Sample

    250308-jbtjzss1fv

  • MD5

    e0f260bf42a51827a56ddcfd55d5ccb2

  • SHA1

    79ae6f34fec41f25eaa9d56419de6aa1ab428001

  • SHA256

    61ff4410523695a2e6bb9fbc100519c05bf552549d72611e64435e721a926e67

  • SHA512

    c3dce5ad4e4449c8c9bfeb0e24122ce0f625203e3ca0b89ecb6c500cee0914673ec295459ee1951ab0fd943168c53fe331406784e95afff1147840464e5f5f78

  • SSDEEP

    3072:F1K/yLrQbWaR5Qax8c/YtNI66i3WxT8NPFuxU71rN0Rti0wqetjMN:FsyLEbWaR5CcVTqN1rueqec

Malware Config

Extracted

Family

gh0strat

C2

154.204.180.84

Targets

    • Target

      61ff4410523695a2e6bb9fbc100519c05bf552549d72611e64435e721a926e67

    • Size

      10.0MB

    • MD5

      e0f260bf42a51827a56ddcfd55d5ccb2

    • SHA1

      79ae6f34fec41f25eaa9d56419de6aa1ab428001

    • SHA256

      61ff4410523695a2e6bb9fbc100519c05bf552549d72611e64435e721a926e67

    • SHA512

      c3dce5ad4e4449c8c9bfeb0e24122ce0f625203e3ca0b89ecb6c500cee0914673ec295459ee1951ab0fd943168c53fe331406784e95afff1147840464e5f5f78

    • SSDEEP

      3072:F1K/yLrQbWaR5Qax8c/YtNI66i3WxT8NPFuxU71rN0Rti0wqetjMN:FsyLEbWaR5CcVTqN1rueqec

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks