General

  • Target

    ab4ff6e02f219cad766bda60c54ae6cba1c857726715337eeb29e70002646503

  • Size

    137KB

  • Sample

    250128-cb55fstnck

  • MD5

    2ff8aee30f8d64b1e4366e87f28e21c2

  • SHA1

    d8afcddb3c9a8d52b0ae329525098d9b27509c88

  • SHA256

    ab4ff6e02f219cad766bda60c54ae6cba1c857726715337eeb29e70002646503

  • SHA512

    80935599413e6251517c9f3e0c747cbe8f12c0a43cdbe3967235efeb88eed390ab62f2d31df2f521402614614a1b4703f00f2d85184ea1f337e902b32991b73c

  • SSDEEP

    3072:1R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuI:Y25GgFny61mraC

Malware Config

Targets

    • Target

      ab4ff6e02f219cad766bda60c54ae6cba1c857726715337eeb29e70002646503

    • Size

      137KB

    • MD5

      2ff8aee30f8d64b1e4366e87f28e21c2

    • SHA1

      d8afcddb3c9a8d52b0ae329525098d9b27509c88

    • SHA256

      ab4ff6e02f219cad766bda60c54ae6cba1c857726715337eeb29e70002646503

    • SHA512

      80935599413e6251517c9f3e0c747cbe8f12c0a43cdbe3967235efeb88eed390ab62f2d31df2f521402614614a1b4703f00f2d85184ea1f337e902b32991b73c

    • SSDEEP

      3072:1R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuI:Y25GgFny61mraC

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks