General

  • Target

    7eee1b5b17cb6f339e7958f4fac8a63ce4346d7757f2414fda86296071fb81caN.exe

  • Size

    137KB

  • Sample

    250127-gg5s4avper

  • MD5

    89fd821ae39d7b75ddd34258451cba50

  • SHA1

    04efcc81195142d0453f6837a5999580a8506cc3

  • SHA256

    7eee1b5b17cb6f339e7958f4fac8a63ce4346d7757f2414fda86296071fb81ca

  • SHA512

    6b18ecdd3641c4080809ef041a77c6502385df72311fab605426f445df26f975ebdd6d1e2b069de023afb253e74f7de5932799613092250f4e607cbb0ab5c756

  • SSDEEP

    3072:NR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu8:A25GgFny61mram

Malware Config

Targets

    • Target

      7eee1b5b17cb6f339e7958f4fac8a63ce4346d7757f2414fda86296071fb81caN.exe

    • Size

      137KB

    • MD5

      89fd821ae39d7b75ddd34258451cba50

    • SHA1

      04efcc81195142d0453f6837a5999580a8506cc3

    • SHA256

      7eee1b5b17cb6f339e7958f4fac8a63ce4346d7757f2414fda86296071fb81ca

    • SHA512

      6b18ecdd3641c4080809ef041a77c6502385df72311fab605426f445df26f975ebdd6d1e2b069de023afb253e74f7de5932799613092250f4e607cbb0ab5c756

    • SSDEEP

      3072:NR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu8:A25GgFny61mram

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks