General

  • Target

    22c8fc9c7ab6759e665a4e9e8bdd2904538ab352038537085f643295b6f33724

  • Size

    318KB

  • Sample

    250328-sfdh1axwg1

  • MD5

    78f9918d06e51b5b4e86e241c95bdbc6

  • SHA1

    fd2331b18c165e2771ebd20d83fd671d9a0a6f7d

  • SHA256

    22c8fc9c7ab6759e665a4e9e8bdd2904538ab352038537085f643295b6f33724

  • SHA512

    cd7730cc3de8417303f9b9ff675281f17ab3e36b76a6c5d81f70e822f05c74d15727df96c6d7af7609b9fa9895b5788cebc6df64abaa86b6ffb1cb2801cbaa1a

  • SSDEEP

    6144:ORoSgWbzYds0SfxsTxt3YeWH8k+p+Nj8DmV9Z3+jH:RSfbzc8GrYdcb88Dw+z

Malware Config

Extracted

Family

gh0strat

C2

host123.zz.am:6658

http://107.163.43.235:12388/

http://107.163.43.236:10289/support.php

Attributes
  • user_agent

    Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C))

    Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)

Targets

    • Target

      22c8fc9c7ab6759e665a4e9e8bdd2904538ab352038537085f643295b6f33724

    • Size

      318KB

    • MD5

      78f9918d06e51b5b4e86e241c95bdbc6

    • SHA1

      fd2331b18c165e2771ebd20d83fd671d9a0a6f7d

    • SHA256

      22c8fc9c7ab6759e665a4e9e8bdd2904538ab352038537085f643295b6f33724

    • SHA512

      cd7730cc3de8417303f9b9ff675281f17ab3e36b76a6c5d81f70e822f05c74d15727df96c6d7af7609b9fa9895b5788cebc6df64abaa86b6ffb1cb2801cbaa1a

    • SSDEEP

      6144:ORoSgWbzYds0SfxsTxt3YeWH8k+p+Nj8DmV9Z3+jH:RSfbzc8GrYdcb88Dw+z

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.