General

  • Target

    d842d4f3145ecf815885d17f5e75df8cb62fc38a2109152127eef0ba552e2f4aN

  • Size

    137KB

  • Sample

    241110-rzkwraydpq

  • MD5

    f324ca57a38366d055870dcbc8b33650

  • SHA1

    1d823c7211db73168a309b4ffa7705c2598cee0d

  • SHA256

    d842d4f3145ecf815885d17f5e75df8cb62fc38a2109152127eef0ba552e2f4a

  • SHA512

    26c3e3a524ee15b4c73baf6a0ad8f57413ab76edcd4132b9ca1222615a9cb94c64489f6efb2955340a0f87371bcb098e618f96357ce2b103b0adac526cef7a52

  • SSDEEP

    3072:VR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUum:425GgFny61mras

Malware Config

Targets

    • Target

      d842d4f3145ecf815885d17f5e75df8cb62fc38a2109152127eef0ba552e2f4aN

    • Size

      137KB

    • MD5

      f324ca57a38366d055870dcbc8b33650

    • SHA1

      1d823c7211db73168a309b4ffa7705c2598cee0d

    • SHA256

      d842d4f3145ecf815885d17f5e75df8cb62fc38a2109152127eef0ba552e2f4a

    • SHA512

      26c3e3a524ee15b4c73baf6a0ad8f57413ab76edcd4132b9ca1222615a9cb94c64489f6efb2955340a0f87371bcb098e618f96357ce2b103b0adac526cef7a52

    • SSDEEP

      3072:VR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUum:425GgFny61mras

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks