General

  • Target

    8ff13473bebd0bb27226ef5b32266da5a277a678da09b25bd49399a829a9a805

  • Size

    137KB

  • Sample

    250128-a9jb8s1ngw

  • MD5

    e09426817da6b80a0ad3c17ef203f074

  • SHA1

    0345e60fc1522a3aa7993b3e6096ebd46a2de184

  • SHA256

    8ff13473bebd0bb27226ef5b32266da5a277a678da09b25bd49399a829a9a805

  • SHA512

    7157e8dccae50b4a498a4beb9b0b47569945dc0e14f9528adcf534eaaa83b759cb9fca2b2329656ee1ab52e0c78cf582141408abd862f32b730ea8cbe9057bc5

  • SSDEEP

    3072:ER02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:h25GgFny61mra

Malware Config

Targets

    • Target

      8ff13473bebd0bb27226ef5b32266da5a277a678da09b25bd49399a829a9a805

    • Size

      137KB

    • MD5

      e09426817da6b80a0ad3c17ef203f074

    • SHA1

      0345e60fc1522a3aa7993b3e6096ebd46a2de184

    • SHA256

      8ff13473bebd0bb27226ef5b32266da5a277a678da09b25bd49399a829a9a805

    • SHA512

      7157e8dccae50b4a498a4beb9b0b47569945dc0e14f9528adcf534eaaa83b759cb9fca2b2329656ee1ab52e0c78cf582141408abd862f32b730ea8cbe9057bc5

    • SSDEEP

      3072:ER02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:h25GgFny61mra

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks