General

  • Target

    0f063869b6f1d1a742ae03d1fdf9fcb9a30feb5f5eb3d20290f05ba79294b4f7

  • Size

    137KB

  • Sample

    250127-yedehasqg1

  • MD5

    9d04dc53a42bfacb65f571c551998252

  • SHA1

    0a6de78ccee1b87877eec051dfb4a2c23e558039

  • SHA256

    0f063869b6f1d1a742ae03d1fdf9fcb9a30feb5f5eb3d20290f05ba79294b4f7

  • SHA512

    9ed040b62ba69876d797ded552258d328054e0d912543e0e2468d5e1eae2409b3c272ee350fcfa8b7b245b0677f376ba75695168290224ce3c486eb17a9afc4f

  • SSDEEP

    3072:SR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu/:325GgFny61mral

Malware Config

Targets

    • Target

      0f063869b6f1d1a742ae03d1fdf9fcb9a30feb5f5eb3d20290f05ba79294b4f7

    • Size

      137KB

    • MD5

      9d04dc53a42bfacb65f571c551998252

    • SHA1

      0a6de78ccee1b87877eec051dfb4a2c23e558039

    • SHA256

      0f063869b6f1d1a742ae03d1fdf9fcb9a30feb5f5eb3d20290f05ba79294b4f7

    • SHA512

      9ed040b62ba69876d797ded552258d328054e0d912543e0e2468d5e1eae2409b3c272ee350fcfa8b7b245b0677f376ba75695168290224ce3c486eb17a9afc4f

    • SSDEEP

      3072:SR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu/:325GgFny61mral

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks