General

  • Target

    0c88b5a7972c119b03ac973ddab65f6147a8dad4aedcb635a1654220df7695f5

  • Size

    137KB

  • Sample

    250301-ygc7hszwg1

  • MD5

    9838a347cf10c6fbd2bce0e34b371c31

  • SHA1

    d5d600b432428b4bfa5fe92bc0ee77868e8b28ca

  • SHA256

    0c88b5a7972c119b03ac973ddab65f6147a8dad4aedcb635a1654220df7695f5

  • SHA512

    3f1e969862e478f64b97407bb39c6e5f507af5bcbd26f5f784b03ef9b0400d928a86f0c80d1cf5da26c83d43e0bf7e0fbf09a5745532812d707bf7ca1d38f78c

  • SSDEEP

    3072:fR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuh:i25GgFny61mraj

Malware Config

Targets

    • Target

      0c88b5a7972c119b03ac973ddab65f6147a8dad4aedcb635a1654220df7695f5

    • Size

      137KB

    • MD5

      9838a347cf10c6fbd2bce0e34b371c31

    • SHA1

      d5d600b432428b4bfa5fe92bc0ee77868e8b28ca

    • SHA256

      0c88b5a7972c119b03ac973ddab65f6147a8dad4aedcb635a1654220df7695f5

    • SHA512

      3f1e969862e478f64b97407bb39c6e5f507af5bcbd26f5f784b03ef9b0400d928a86f0c80d1cf5da26c83d43e0bf7e0fbf09a5745532812d707bf7ca1d38f78c

    • SSDEEP

      3072:fR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuh:i25GgFny61mraj

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks