General

  • Target

    9c4bf360e3751b1b9c55e4d29a4260599f1992652b21a303d8efb03487faf58fN

  • Size

    137KB

  • Sample

    241110-swcawaspfj

  • MD5

    3e996002a7e1312c0bbb6f3127cb59c0

  • SHA1

    08ae195aced03ea15565cad00bbe02a854235472

  • SHA256

    9c4bf360e3751b1b9c55e4d29a4260599f1992652b21a303d8efb03487faf58f

  • SHA512

    cb11effabaf7080a1ac7dd2e1329b6eefd148d28d50073c5a63de23ea16309ff0fa9b30291818d103e886d832ebd202b382d8e9df3f6f0f8f0d1dc5001ae046c

  • SSDEEP

    3072:tR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu/:g25GgFny61mrat

Malware Config

Targets

    • Target

      9c4bf360e3751b1b9c55e4d29a4260599f1992652b21a303d8efb03487faf58fN

    • Size

      137KB

    • MD5

      3e996002a7e1312c0bbb6f3127cb59c0

    • SHA1

      08ae195aced03ea15565cad00bbe02a854235472

    • SHA256

      9c4bf360e3751b1b9c55e4d29a4260599f1992652b21a303d8efb03487faf58f

    • SHA512

      cb11effabaf7080a1ac7dd2e1329b6eefd148d28d50073c5a63de23ea16309ff0fa9b30291818d103e886d832ebd202b382d8e9df3f6f0f8f0d1dc5001ae046c

    • SSDEEP

      3072:tR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu/:g25GgFny61mrat

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks