General

  • Target

    cdcae892b9f43ef306c6c11792835bcbdfac0d4e67c39d13d14ecc51818c4bf8

  • Size

    137KB

  • Sample

    250128-dzlamawjbv

  • MD5

    a8626dbc4e7a08700899062dfc904b69

  • SHA1

    119d1b49de9cbd285a376b4c2c2c3207494cd864

  • SHA256

    cdcae892b9f43ef306c6c11792835bcbdfac0d4e67c39d13d14ecc51818c4bf8

  • SHA512

    52b203378afff96633f07d23f159f4712742a940264397003ca4b3025078652016598675f97460cc3f922b71e47eab6fca5ff2f7bfdf3bf501b7c64ddf55402f

  • SSDEEP

    3072:hR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuP:s25GgFny61mrap

Malware Config

Targets

    • Target

      cdcae892b9f43ef306c6c11792835bcbdfac0d4e67c39d13d14ecc51818c4bf8

    • Size

      137KB

    • MD5

      a8626dbc4e7a08700899062dfc904b69

    • SHA1

      119d1b49de9cbd285a376b4c2c2c3207494cd864

    • SHA256

      cdcae892b9f43ef306c6c11792835bcbdfac0d4e67c39d13d14ecc51818c4bf8

    • SHA512

      52b203378afff96633f07d23f159f4712742a940264397003ca4b3025078652016598675f97460cc3f922b71e47eab6fca5ff2f7bfdf3bf501b7c64ddf55402f

    • SSDEEP

      3072:hR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuP:s25GgFny61mrap

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks