General

  • Target

    a0cd3d0bfbce122bd208f3261af74a50N.exe

  • Size

    137KB

  • Sample

    240906-r64x7ssbml

  • MD5

    a0cd3d0bfbce122bd208f3261af74a50

  • SHA1

    bc82779c5640f432f48b1be63b7efbedc6e212c8

  • SHA256

    6c786e16221406c824d9dce4e440c1b74a4710cd3f79cec8a01b3cb1d573166c

  • SHA512

    4a27418b270b484eb82796214cc8fe3dc5880e24fa88c1d4dbdd141691bbf6ef6d66aeab388eb3fc2ad2b91a23caa4c3ffdefce0dc1b48e69a8d14fe67bf7345

  • SSDEEP

    3072:aR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu3:P25GgFny61mra5

Malware Config

Targets

    • Target

      a0cd3d0bfbce122bd208f3261af74a50N.exe

    • Size

      137KB

    • MD5

      a0cd3d0bfbce122bd208f3261af74a50

    • SHA1

      bc82779c5640f432f48b1be63b7efbedc6e212c8

    • SHA256

      6c786e16221406c824d9dce4e440c1b74a4710cd3f79cec8a01b3cb1d573166c

    • SHA512

      4a27418b270b484eb82796214cc8fe3dc5880e24fa88c1d4dbdd141691bbf6ef6d66aeab388eb3fc2ad2b91a23caa4c3ffdefce0dc1b48e69a8d14fe67bf7345

    • SSDEEP

      3072:aR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu3:P25GgFny61mra5

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks