General

  • Target

    599b6b322d1c7f4a2fd0d75b1a034e20N

  • Size

    137KB

  • Sample

    240914-aden6swerp

  • MD5

    599b6b322d1c7f4a2fd0d75b1a034e20

  • SHA1

    dbd6a5aaa36d0d747dad8e15ab7190f13f30effe

  • SHA256

    a0af99df1c9e8616848e61446e1783047ed018a7ef83c6ee1dad09ca7ed24406

  • SHA512

    7cdc7bafdce743427b6ec44396802965c0ed54378ef0e1a657934b371d026d8ad9bb26515010d118457b18dee01bb3ddf6083339942df072cb31b1823465c0fa

  • SSDEEP

    3072:WR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUul:T25GgFny61mrab

Malware Config

Targets

    • Target

      599b6b322d1c7f4a2fd0d75b1a034e20N

    • Size

      137KB

    • MD5

      599b6b322d1c7f4a2fd0d75b1a034e20

    • SHA1

      dbd6a5aaa36d0d747dad8e15ab7190f13f30effe

    • SHA256

      a0af99df1c9e8616848e61446e1783047ed018a7ef83c6ee1dad09ca7ed24406

    • SHA512

      7cdc7bafdce743427b6ec44396802965c0ed54378ef0e1a657934b371d026d8ad9bb26515010d118457b18dee01bb3ddf6083339942df072cb31b1823465c0fa

    • SSDEEP

      3072:WR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUul:T25GgFny61mrab

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks