General

  • Target

    a98eb3758dc3f9c07960c2269b4a9eb0N

  • Size

    137KB

  • Sample

    240913-ym3z5awdlg

  • MD5

    a98eb3758dc3f9c07960c2269b4a9eb0

  • SHA1

    d3c8ea0385cca22f30b981e3b0c1a02e9710f881

  • SHA256

    81adc70930a559ef583f84bb920987462559bedbb85efccce8f116fc2083befd

  • SHA512

    bbfdc14ee8bf871ec65a3b643d50863b61ca9f6b90dbb5dae20250e7b1b6627d68a24c22362e92d692dbac748aeda0d1320fb37093982c64f788763904128d3f

  • SSDEEP

    3072:dR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuI:w25GgFny61mraC

Malware Config

Targets

    • Target

      a98eb3758dc3f9c07960c2269b4a9eb0N

    • Size

      137KB

    • MD5

      a98eb3758dc3f9c07960c2269b4a9eb0

    • SHA1

      d3c8ea0385cca22f30b981e3b0c1a02e9710f881

    • SHA256

      81adc70930a559ef583f84bb920987462559bedbb85efccce8f116fc2083befd

    • SHA512

      bbfdc14ee8bf871ec65a3b643d50863b61ca9f6b90dbb5dae20250e7b1b6627d68a24c22362e92d692dbac748aeda0d1320fb37093982c64f788763904128d3f

    • SSDEEP

      3072:dR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuI:w25GgFny61mraC

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks