General

  • Target

    9dea3ec17bc163613c289db8351a589bf6544071940742f510897f16e9af16bc

  • Size

    137KB

  • Sample

    250302-c86r9asls2

  • MD5

    d35db85eec7f7cb6ed56e4d57446312b

  • SHA1

    1cbdd93de16ca5dbd98531487e037a7f82ed558f

  • SHA256

    9dea3ec17bc163613c289db8351a589bf6544071940742f510897f16e9af16bc

  • SHA512

    76f15964611de4e6344aa0a66d6a309406bdf7955af553aac4ed57faa17b580834b743ba8d97241447d309564060a062270ad76575b92a451c66415aef0d71d8

  • SSDEEP

    3072:rR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuX:G25GgFny61mra5

Malware Config

Targets

    • Target

      9dea3ec17bc163613c289db8351a589bf6544071940742f510897f16e9af16bc

    • Size

      137KB

    • MD5

      d35db85eec7f7cb6ed56e4d57446312b

    • SHA1

      1cbdd93de16ca5dbd98531487e037a7f82ed558f

    • SHA256

      9dea3ec17bc163613c289db8351a589bf6544071940742f510897f16e9af16bc

    • SHA512

      76f15964611de4e6344aa0a66d6a309406bdf7955af553aac4ed57faa17b580834b743ba8d97241447d309564060a062270ad76575b92a451c66415aef0d71d8

    • SSDEEP

      3072:rR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuX:G25GgFny61mra5

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks