General

  • Target

    cdcae892b9f43ef306c6c11792835bcbdfac0d4e67c39d13d14ecc51818c4bf8

  • Size

    137KB

  • Sample

    250128-dzlamawjbv

  • MD5

    a8626dbc4e7a08700899062dfc904b69

  • SHA1

    119d1b49de9cbd285a376b4c2c2c3207494cd864

  • SHA256

    cdcae892b9f43ef306c6c11792835bcbdfac0d4e67c39d13d14ecc51818c4bf8

  • SHA512

    52b203378afff96633f07d23f159f4712742a940264397003ca4b3025078652016598675f97460cc3f922b71e47eab6fca5ff2f7bfdf3bf501b7c64ddf55402f

  • SSDEEP

    3072:hR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuP:s25GgFny61mrap

Malware Config

Targets

    • Target

      cdcae892b9f43ef306c6c11792835bcbdfac0d4e67c39d13d14ecc51818c4bf8

    • Size

      137KB

    • MD5

      a8626dbc4e7a08700899062dfc904b69

    • SHA1

      119d1b49de9cbd285a376b4c2c2c3207494cd864

    • SHA256

      cdcae892b9f43ef306c6c11792835bcbdfac0d4e67c39d13d14ecc51818c4bf8

    • SHA512

      52b203378afff96633f07d23f159f4712742a940264397003ca4b3025078652016598675f97460cc3f922b71e47eab6fca5ff2f7bfdf3bf501b7c64ddf55402f

    • SSDEEP

      3072:hR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuP:s25GgFny61mrap

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.