General

  • Target

    5bd74752836cfe38efcb7077bc3a89c2eb32b01a807e67f89d4da9025d04f839N.exe

  • Size

    137KB

  • Sample

    250127-kavw4azkbt

  • MD5

    18125263be2eafbd7d13c251bd0b5fa0

  • SHA1

    b2e2680058edd9c2ae355d230acc9be6dcc51565

  • SHA256

    5bd74752836cfe38efcb7077bc3a89c2eb32b01a807e67f89d4da9025d04f839

  • SHA512

    d650cca481048d37e8339b28e0355ff9b78dfd4e3171f22c66bd6045585270247dd44338c81c50a7d2e5b3d3ad77d5a724a544a248333235e2da058267fa857f

  • SSDEEP

    3072:+R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuD:r25GgFny61mrap

Malware Config

Targets

    • Target

      5bd74752836cfe38efcb7077bc3a89c2eb32b01a807e67f89d4da9025d04f839N.exe

    • Size

      137KB

    • MD5

      18125263be2eafbd7d13c251bd0b5fa0

    • SHA1

      b2e2680058edd9c2ae355d230acc9be6dcc51565

    • SHA256

      5bd74752836cfe38efcb7077bc3a89c2eb32b01a807e67f89d4da9025d04f839

    • SHA512

      d650cca481048d37e8339b28e0355ff9b78dfd4e3171f22c66bd6045585270247dd44338c81c50a7d2e5b3d3ad77d5a724a544a248333235e2da058267fa857f

    • SSDEEP

      3072:+R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuD:r25GgFny61mrap

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks