General

  • Target

    6e0ef3afaf509a2f92d56789af6d999336652732f356008643405826681aa80cN.exe

  • Size

    137KB

  • Sample

    241114-h72d2awcnq

  • MD5

    41b1c883badb4ffbd4ec1401d98423c0

  • SHA1

    a982005d087fd269e1fd4cfa7cef9e983080a761

  • SHA256

    6e0ef3afaf509a2f92d56789af6d999336652732f356008643405826681aa80c

  • SHA512

    63c399f1f39201296d04b657a7b4ff25f87d5c6bc19d8bba74dfb9a2066cbcd4f35a47514f63bf2d08d56bef38e9b9cb140c3030b6ab41805ed1cc3a09858c34

  • SSDEEP

    3072:BR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:M25GgFny61mra

Malware Config

Targets

    • Target

      6e0ef3afaf509a2f92d56789af6d999336652732f356008643405826681aa80cN.exe

    • Size

      137KB

    • MD5

      41b1c883badb4ffbd4ec1401d98423c0

    • SHA1

      a982005d087fd269e1fd4cfa7cef9e983080a761

    • SHA256

      6e0ef3afaf509a2f92d56789af6d999336652732f356008643405826681aa80c

    • SHA512

      63c399f1f39201296d04b657a7b4ff25f87d5c6bc19d8bba74dfb9a2066cbcd4f35a47514f63bf2d08d56bef38e9b9cb140c3030b6ab41805ed1cc3a09858c34

    • SSDEEP

      3072:BR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:M25GgFny61mra

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks