General

  • Target

    d847dfb08860b68c2916ef44c8db7b60N

  • Size

    137KB

  • Sample

    240909-vlpvbs1hle

  • MD5

    d847dfb08860b68c2916ef44c8db7b60

  • SHA1

    ae4af6f9c047a4a96b70b205f6aac2ca896d9b44

  • SHA256

    2f7d2a700e02dbde1481be7523d16bdb2e7932b4e8a52a0f8f2e3657923fdbb5

  • SHA512

    f8a4cf6e7d829dad3464e0b35cff6f02fb065454937709856a16a77b74e30d9da05fd79ece8df7d1d127aba173a9238436e8bddc5df852f5a944af96aee2cc80

  • SSDEEP

    3072:xR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuX:c25GgFny61mrap

Malware Config

Targets

    • Target

      d847dfb08860b68c2916ef44c8db7b60N

    • Size

      137KB

    • MD5

      d847dfb08860b68c2916ef44c8db7b60

    • SHA1

      ae4af6f9c047a4a96b70b205f6aac2ca896d9b44

    • SHA256

      2f7d2a700e02dbde1481be7523d16bdb2e7932b4e8a52a0f8f2e3657923fdbb5

    • SHA512

      f8a4cf6e7d829dad3464e0b35cff6f02fb065454937709856a16a77b74e30d9da05fd79ece8df7d1d127aba173a9238436e8bddc5df852f5a944af96aee2cc80

    • SSDEEP

      3072:xR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuX:c25GgFny61mrap

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks