General

  • Target

    5e8c5b576dd8a3d7f57e18085f040e7ff751395a3fbc265a1baf11268024ab4e

  • Size

    137KB

  • Sample

    250302-3vmekazks5

  • MD5

    af9d65a91aca036afb3df7d9b029eab6

  • SHA1

    d631f806782b79519dedab2a263efc424ff30692

  • SHA256

    5e8c5b576dd8a3d7f57e18085f040e7ff751395a3fbc265a1baf11268024ab4e

  • SHA512

    889c887a1a181bfb6a4432287a24775859cff9bbafaa0c90d658145cda0d0f36ed967d4a8e20cd3a744cd566e0833b4993bf34359d496503638de04aa07cc15c

  • SSDEEP

    3072:9R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUua:Q25GgFny61mraQ

Malware Config

Targets

    • Target

      5e8c5b576dd8a3d7f57e18085f040e7ff751395a3fbc265a1baf11268024ab4e

    • Size

      137KB

    • MD5

      af9d65a91aca036afb3df7d9b029eab6

    • SHA1

      d631f806782b79519dedab2a263efc424ff30692

    • SHA256

      5e8c5b576dd8a3d7f57e18085f040e7ff751395a3fbc265a1baf11268024ab4e

    • SHA512

      889c887a1a181bfb6a4432287a24775859cff9bbafaa0c90d658145cda0d0f36ed967d4a8e20cd3a744cd566e0833b4993bf34359d496503638de04aa07cc15c

    • SSDEEP

      3072:9R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUua:Q25GgFny61mraQ

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks