General

  • Target

    e0e1134128e669c2a5e40bc5509abd49863e8c09c4617b54cd3aca05cc9d9584.exe

  • Size

    137KB

  • Sample

    250127-nv8v8swrcw

  • MD5

    315a811be865ba2a572917e7ba484a61

  • SHA1

    fe5292a7ff6237479ea0b434dad8ca0c40014222

  • SHA256

    e0e1134128e669c2a5e40bc5509abd49863e8c09c4617b54cd3aca05cc9d9584

  • SHA512

    c434dfc65408ef0f4f300e9f0a47d0a80c6800e777357932d6b0a10a8b3f422903945a51f87cd593e143dbdc90715737623bf27bbbeb37300443ca006256fa66

  • SSDEEP

    3072:FR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuu:I25GgFny61mraY

Malware Config

Targets

    • Target

      e0e1134128e669c2a5e40bc5509abd49863e8c09c4617b54cd3aca05cc9d9584.exe

    • Size

      137KB

    • MD5

      315a811be865ba2a572917e7ba484a61

    • SHA1

      fe5292a7ff6237479ea0b434dad8ca0c40014222

    • SHA256

      e0e1134128e669c2a5e40bc5509abd49863e8c09c4617b54cd3aca05cc9d9584

    • SHA512

      c434dfc65408ef0f4f300e9f0a47d0a80c6800e777357932d6b0a10a8b3f422903945a51f87cd593e143dbdc90715737623bf27bbbeb37300443ca006256fa66

    • SSDEEP

      3072:FR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuu:I25GgFny61mraY

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks