General

  • Target

    9f8d91ada5635f01f7d34b87a911bd39ddb4c49462b31674ae5795bce2dbe4b0N

  • Size

    137KB

  • Sample

    241114-hxa44awbrp

  • MD5

    e48d0f338eb57be83eddaa72e5423020

  • SHA1

    2619b633e8bdd309241b5f7ca0895394876cd343

  • SHA256

    9f8d91ada5635f01f7d34b87a911bd39ddb4c49462b31674ae5795bce2dbe4b0

  • SHA512

    6394e30781202a1bee26b3350cb1aa8ea48471d4404cb61de8b9d68efe87d9e2106eb93023a0a2e86725534cc99df3c17378b9826966bab2ad2ae85c23b7890c

  • SSDEEP

    3072:pR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:k25GgFny61mra

Malware Config

Targets

    • Target

      9f8d91ada5635f01f7d34b87a911bd39ddb4c49462b31674ae5795bce2dbe4b0N

    • Size

      137KB

    • MD5

      e48d0f338eb57be83eddaa72e5423020

    • SHA1

      2619b633e8bdd309241b5f7ca0895394876cd343

    • SHA256

      9f8d91ada5635f01f7d34b87a911bd39ddb4c49462b31674ae5795bce2dbe4b0

    • SHA512

      6394e30781202a1bee26b3350cb1aa8ea48471d4404cb61de8b9d68efe87d9e2106eb93023a0a2e86725534cc99df3c17378b9826966bab2ad2ae85c23b7890c

    • SSDEEP

      3072:pR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:k25GgFny61mra

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks