General

  • Target

    dd35bca4c87ccd91a41ed56c4368cd40N

  • Size

    137KB

  • Sample

    240912-q7c1faxdjl

  • MD5

    dd35bca4c87ccd91a41ed56c4368cd40

  • SHA1

    6d0ee86b23a7563d35a8cf05895b82d9cfd55a26

  • SHA256

    f59b3f463fae5e7c25afab2033f1094e43e575bc6d28ce3534efcf4a66d06b92

  • SHA512

    969abc5d1525046756fd0afb13a32dd97a1c114bbd8282a35579113a5fa12df797325910a9b8778ed00e602bc5bd72463408214f8415daa2820b2399664a4ddb

  • SSDEEP

    3072:0R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuH:x25GgFny61mrah

Malware Config

Targets

    • Target

      dd35bca4c87ccd91a41ed56c4368cd40N

    • Size

      137KB

    • MD5

      dd35bca4c87ccd91a41ed56c4368cd40

    • SHA1

      6d0ee86b23a7563d35a8cf05895b82d9cfd55a26

    • SHA256

      f59b3f463fae5e7c25afab2033f1094e43e575bc6d28ce3534efcf4a66d06b92

    • SHA512

      969abc5d1525046756fd0afb13a32dd97a1c114bbd8282a35579113a5fa12df797325910a9b8778ed00e602bc5bd72463408214f8415daa2820b2399664a4ddb

    • SSDEEP

      3072:0R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuH:x25GgFny61mrah

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks