General

  • Target

    47e0cdd16e0337637658adc9b82eb951ae2dfa0bf7454f155d8f439106e4e269.exe

  • Size

    137KB

  • Sample

    250127-mhg2bavpen

  • MD5

    6006cb9df7bbb217c7f8d8d75f3d7e99

  • SHA1

    794bea76abdf177b1c3698b666888b456cae048c

  • SHA256

    47e0cdd16e0337637658adc9b82eb951ae2dfa0bf7454f155d8f439106e4e269

  • SHA512

    6708e4d6c3ab36b2b27ce168980501084ee1ff51151d11dadafefa24b4e3214e1226e3fa37e379d4c72ff650327692a53b32386cbed92cd1858e496f8d325154

  • SSDEEP

    3072:cR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuO:p25GgFny61mras

Malware Config

Targets

    • Target

      47e0cdd16e0337637658adc9b82eb951ae2dfa0bf7454f155d8f439106e4e269.exe

    • Size

      137KB

    • MD5

      6006cb9df7bbb217c7f8d8d75f3d7e99

    • SHA1

      794bea76abdf177b1c3698b666888b456cae048c

    • SHA256

      47e0cdd16e0337637658adc9b82eb951ae2dfa0bf7454f155d8f439106e4e269

    • SHA512

      6708e4d6c3ab36b2b27ce168980501084ee1ff51151d11dadafefa24b4e3214e1226e3fa37e379d4c72ff650327692a53b32386cbed92cd1858e496f8d325154

    • SSDEEP

      3072:cR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuO:p25GgFny61mras

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks