General

  • Target

    4bf4716f676a2f04988b968c5004fe83d363f1e11d09fdb9071a780116eabe89N

  • Size

    137KB

  • Sample

    241031-gcx8fsspaj

  • MD5

    6e93d2f5ffab3061e8e01fa7e356f270

  • SHA1

    192f27b3b11a0f2c10790830fa15cb23cefb084c

  • SHA256

    4bf4716f676a2f04988b968c5004fe83d363f1e11d09fdb9071a780116eabe89

  • SHA512

    25a6acb46814f89c9c38e230c8539dc7350fb3b98dee63d59f7dd2e69e5c225de678ae047fefaff7ad96f1d096721355e568efde6afa56bf252f844a55ffa7c2

  • SSDEEP

    3072:NR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:A25GgFny61mra

Malware Config

Targets

    • Target

      4bf4716f676a2f04988b968c5004fe83d363f1e11d09fdb9071a780116eabe89N

    • Size

      137KB

    • MD5

      6e93d2f5ffab3061e8e01fa7e356f270

    • SHA1

      192f27b3b11a0f2c10790830fa15cb23cefb084c

    • SHA256

      4bf4716f676a2f04988b968c5004fe83d363f1e11d09fdb9071a780116eabe89

    • SHA512

      25a6acb46814f89c9c38e230c8539dc7350fb3b98dee63d59f7dd2e69e5c225de678ae047fefaff7ad96f1d096721355e568efde6afa56bf252f844a55ffa7c2

    • SSDEEP

      3072:NR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:A25GgFny61mra

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks