General

  • Target

    f32749877eca9e940ceb6d6ee445e4eee5c526242b714cc4e7c29d7c459a1c7d

  • Size

    137KB

  • Sample

    250128-fnq3vaylak

  • MD5

    60f3b91184119e7935eb2ec088d366a6

  • SHA1

    3df8edabd359b274dd0a242e56f9425c6b2e53f0

  • SHA256

    f32749877eca9e940ceb6d6ee445e4eee5c526242b714cc4e7c29d7c459a1c7d

  • SHA512

    f5b2f08ef22e5e1914421244b2c6de969509038062a565c30a6f6756ddbb3ae14be8050e07e076e0ba9c8531d40e56459a9e04f1d47968b45195f791d1ddefad

  • SSDEEP

    3072:wR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:V25GgFny61mra

Malware Config

Targets

    • Target

      f32749877eca9e940ceb6d6ee445e4eee5c526242b714cc4e7c29d7c459a1c7d

    • Size

      137KB

    • MD5

      60f3b91184119e7935eb2ec088d366a6

    • SHA1

      3df8edabd359b274dd0a242e56f9425c6b2e53f0

    • SHA256

      f32749877eca9e940ceb6d6ee445e4eee5c526242b714cc4e7c29d7c459a1c7d

    • SHA512

      f5b2f08ef22e5e1914421244b2c6de969509038062a565c30a6f6756ddbb3ae14be8050e07e076e0ba9c8531d40e56459a9e04f1d47968b45195f791d1ddefad

    • SSDEEP

      3072:wR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:V25GgFny61mra

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks