General

  • Target

    9294227e59c84368fef788cb6938b13a2c458d33d3b721da29014b4c8f58e67e.exe

  • Size

    137KB

  • Sample

    250127-ckct9svpg1

  • MD5

    42836fabd61e79fa1d1ed2de330083b0

  • SHA1

    ec2e6e89ce7aa16fcf292a8e9f8e23eb69e36081

  • SHA256

    9294227e59c84368fef788cb6938b13a2c458d33d3b721da29014b4c8f58e67e

  • SHA512

    5b411225db98f138ed63230dd8379ee9e4ea8ede542bbcf576d7efaed7bb02bcdd10608a5482ade862dcca3c4c3a080b8e4d3fe48f77ade1c75790658ab1ca2c

  • SSDEEP

    3072:2R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuI:z25GgFny61mraS

Malware Config

Targets

    • Target

      9294227e59c84368fef788cb6938b13a2c458d33d3b721da29014b4c8f58e67e.exe

    • Size

      137KB

    • MD5

      42836fabd61e79fa1d1ed2de330083b0

    • SHA1

      ec2e6e89ce7aa16fcf292a8e9f8e23eb69e36081

    • SHA256

      9294227e59c84368fef788cb6938b13a2c458d33d3b721da29014b4c8f58e67e

    • SHA512

      5b411225db98f138ed63230dd8379ee9e4ea8ede542bbcf576d7efaed7bb02bcdd10608a5482ade862dcca3c4c3a080b8e4d3fe48f77ade1c75790658ab1ca2c

    • SSDEEP

      3072:2R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuI:z25GgFny61mraS

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks