General

  • Target

    40d7592a80cf1364d3fb9a594cdf00f38a456adf95875c76d9b2e8b4df5254d9.exe

  • Size

    137KB

  • Sample

    250127-cj62qavpft

  • MD5

    ffcda82a0a39d19fb793e362bc532233

  • SHA1

    d749d26e0f9551257cd8c3b728985fdd90f5b875

  • SHA256

    40d7592a80cf1364d3fb9a594cdf00f38a456adf95875c76d9b2e8b4df5254d9

  • SHA512

    f94f2dce66b1c6ea5345a37711dc8171eaded789952ab484d8c8fc683ff3013c4213f6e14c20dda48362ea003e3f7946347e2a2fb2c3f6ba63229cfc0a92c05a

  • SSDEEP

    3072:NR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu8:A25GgFny61mraW

Malware Config

Targets

    • Target

      40d7592a80cf1364d3fb9a594cdf00f38a456adf95875c76d9b2e8b4df5254d9.exe

    • Size

      137KB

    • MD5

      ffcda82a0a39d19fb793e362bc532233

    • SHA1

      d749d26e0f9551257cd8c3b728985fdd90f5b875

    • SHA256

      40d7592a80cf1364d3fb9a594cdf00f38a456adf95875c76d9b2e8b4df5254d9

    • SHA512

      f94f2dce66b1c6ea5345a37711dc8171eaded789952ab484d8c8fc683ff3013c4213f6e14c20dda48362ea003e3f7946347e2a2fb2c3f6ba63229cfc0a92c05a

    • SSDEEP

      3072:NR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu8:A25GgFny61mraW

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks