General

  • Target

    2e061b7be34dc871cfbaeb6f5201e70bcf23cbb666e8873b3d44bc488dab70ffN

  • Size

    137KB

  • Sample

    241002-pbct5ayglc

  • MD5

    c128d757ba87ccdcafca756714244020

  • SHA1

    2ca7604710073f28f4d0aeb69bc168ab0d85a6b5

  • SHA256

    2e061b7be34dc871cfbaeb6f5201e70bcf23cbb666e8873b3d44bc488dab70ff

  • SHA512

    f09abcd0c33194ef0d7ec3cecc0fd71ad9a397891a6f0a42749e55c5cea4cd2ba977e0d15a75e1158a3340fa863af9c49b6398b0c09538ff09ef59f47ca0fa74

  • SSDEEP

    3072:9R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUue:Q25GgFny61mra0

Malware Config

Targets

    • Target

      2e061b7be34dc871cfbaeb6f5201e70bcf23cbb666e8873b3d44bc488dab70ffN

    • Size

      137KB

    • MD5

      c128d757ba87ccdcafca756714244020

    • SHA1

      2ca7604710073f28f4d0aeb69bc168ab0d85a6b5

    • SHA256

      2e061b7be34dc871cfbaeb6f5201e70bcf23cbb666e8873b3d44bc488dab70ff

    • SHA512

      f09abcd0c33194ef0d7ec3cecc0fd71ad9a397891a6f0a42749e55c5cea4cd2ba977e0d15a75e1158a3340fa863af9c49b6398b0c09538ff09ef59f47ca0fa74

    • SSDEEP

      3072:9R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUue:Q25GgFny61mra0

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks