General

  • Target

    ea4931c5e4f1fc27ffcba00b508d18b05e9ecafd1f0155c73ef41acfaa94e263

  • Size

    137KB

  • Sample

    240919-dke53axhjm

  • MD5

    081462ebe6aa41e3bfbd89007e68ebde

  • SHA1

    d64a6257c9af09d4ea6a94acff832409c75e0eda

  • SHA256

    ea4931c5e4f1fc27ffcba00b508d18b05e9ecafd1f0155c73ef41acfaa94e263

  • SHA512

    a64549749a338f8254f4659aca4b545a8b64e07bfa8609d59f533c04053c0c5a1b6887cad663c95fd47ecd294d6aedf9c27120eddea99870ed382890fcbe7fbc

  • SSDEEP

    3072:uR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUue:725GgFny61mras

Malware Config

Targets

    • Target

      ea4931c5e4f1fc27ffcba00b508d18b05e9ecafd1f0155c73ef41acfaa94e263

    • Size

      137KB

    • MD5

      081462ebe6aa41e3bfbd89007e68ebde

    • SHA1

      d64a6257c9af09d4ea6a94acff832409c75e0eda

    • SHA256

      ea4931c5e4f1fc27ffcba00b508d18b05e9ecafd1f0155c73ef41acfaa94e263

    • SHA512

      a64549749a338f8254f4659aca4b545a8b64e07bfa8609d59f533c04053c0c5a1b6887cad663c95fd47ecd294d6aedf9c27120eddea99870ed382890fcbe7fbc

    • SSDEEP

      3072:uR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUue:725GgFny61mras

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks