General

  • Target

    6eb043d63860b370cc4eefea3fe0c46a136fe15b1116886e55db8139a8fde139

  • Size

    137KB

  • Sample

    250302-ats7haxxh1

  • MD5

    b951f7bbef801f1053b4fafbabde1848

  • SHA1

    b22fed43940cde62ce187c8dffb07a457255552c

  • SHA256

    6eb043d63860b370cc4eefea3fe0c46a136fe15b1116886e55db8139a8fde139

  • SHA512

    8722a752cc4c662b8ff908c4303f663d35db1bd98a94e0472fac1a5c5ae6a7bae66ff0f375b9089fe010db53efc9c88ce5163a88ddede40f7655e47104642f66

  • SSDEEP

    3072:7R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuH:225GgFny61mraZ

Malware Config

Targets

    • Target

      6eb043d63860b370cc4eefea3fe0c46a136fe15b1116886e55db8139a8fde139

    • Size

      137KB

    • MD5

      b951f7bbef801f1053b4fafbabde1848

    • SHA1

      b22fed43940cde62ce187c8dffb07a457255552c

    • SHA256

      6eb043d63860b370cc4eefea3fe0c46a136fe15b1116886e55db8139a8fde139

    • SHA512

      8722a752cc4c662b8ff908c4303f663d35db1bd98a94e0472fac1a5c5ae6a7bae66ff0f375b9089fe010db53efc9c88ce5163a88ddede40f7655e47104642f66

    • SSDEEP

      3072:7R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuH:225GgFny61mraZ

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks