General

  • Target

    5a5f13d201e227857558c902ec71da7810514cdc3c10a908b9dd2aeea7db7844.exe

  • Size

    137KB

  • Sample

    241114-c6gqcatcrk

  • MD5

    6bb8264813d9675d10eddd7a04ae8b68

  • SHA1

    158f34b4e145839e790cbe55b75deded67d78057

  • SHA256

    5a5f13d201e227857558c902ec71da7810514cdc3c10a908b9dd2aeea7db7844

  • SHA512

    76f7bda14c3ba324b03cab0844389c87dc001403cd41a88ee7b01fee4c1feed716d5dbcfd6d1744b1154aa97c5151c4b85e21a8b3c90a9fa4072a7378c57d7d9

  • SSDEEP

    3072:BR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuY:M25GgFny61mra6

Malware Config

Targets

    • Target

      5a5f13d201e227857558c902ec71da7810514cdc3c10a908b9dd2aeea7db7844.exe

    • Size

      137KB

    • MD5

      6bb8264813d9675d10eddd7a04ae8b68

    • SHA1

      158f34b4e145839e790cbe55b75deded67d78057

    • SHA256

      5a5f13d201e227857558c902ec71da7810514cdc3c10a908b9dd2aeea7db7844

    • SHA512

      76f7bda14c3ba324b03cab0844389c87dc001403cd41a88ee7b01fee4c1feed716d5dbcfd6d1744b1154aa97c5151c4b85e21a8b3c90a9fa4072a7378c57d7d9

    • SSDEEP

      3072:BR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuY:M25GgFny61mra6

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks