General

  • Target

    236bc5f3d5b4a1435ef10b477ff15093562dca0ae87e6c9fd5bcad760ba497f5N.exe

  • Size

    137KB

  • Sample

    250127-ngjdesxjhr

  • MD5

    9e98bbd8300724a3d379d9dcc537b6d0

  • SHA1

    d7e44e2e8eedee7d5ce003043eb6c1acf84f4d83

  • SHA256

    236bc5f3d5b4a1435ef10b477ff15093562dca0ae87e6c9fd5bcad760ba497f5

  • SHA512

    d2c2c686365b37f2de062f341e2eb58b7061dec11d611e1889560498c933fd47544ddeb5b8f824bd6243966e3dcd85be0f63ddc43c6437d4741b4d4c4e013129

  • SSDEEP

    3072:OR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu/:b25GgFny61mra9

Malware Config

Targets

    • Target

      236bc5f3d5b4a1435ef10b477ff15093562dca0ae87e6c9fd5bcad760ba497f5N.exe

    • Size

      137KB

    • MD5

      9e98bbd8300724a3d379d9dcc537b6d0

    • SHA1

      d7e44e2e8eedee7d5ce003043eb6c1acf84f4d83

    • SHA256

      236bc5f3d5b4a1435ef10b477ff15093562dca0ae87e6c9fd5bcad760ba497f5

    • SHA512

      d2c2c686365b37f2de062f341e2eb58b7061dec11d611e1889560498c933fd47544ddeb5b8f824bd6243966e3dcd85be0f63ddc43c6437d4741b4d4c4e013129

    • SSDEEP

      3072:OR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu/:b25GgFny61mra9

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks