General

  • Target

    969287063556481929a300da954ecbf79233640a8d81ddc4535bc0cff0832a50

  • Size

    137KB

  • Sample

    250302-cw118s1py4

  • MD5

    2a064f5f0a85de2ab65e8810099b1964

  • SHA1

    9dffbf55d4c79eb9165b9a75a1ef8249f9cc1f33

  • SHA256

    969287063556481929a300da954ecbf79233640a8d81ddc4535bc0cff0832a50

  • SHA512

    85519a1121820538d7383a14c1d165a1a2dd360fe99c7a14254b68b654de8cef60e0636bc4883be9037be2920d0955a3370f10735806cff0a5c8ae2b9bca4d40

  • SSDEEP

    3072:zR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu3:e25GgFny61mraB

Malware Config

Targets

    • Target

      969287063556481929a300da954ecbf79233640a8d81ddc4535bc0cff0832a50

    • Size

      137KB

    • MD5

      2a064f5f0a85de2ab65e8810099b1964

    • SHA1

      9dffbf55d4c79eb9165b9a75a1ef8249f9cc1f33

    • SHA256

      969287063556481929a300da954ecbf79233640a8d81ddc4535bc0cff0832a50

    • SHA512

      85519a1121820538d7383a14c1d165a1a2dd360fe99c7a14254b68b654de8cef60e0636bc4883be9037be2920d0955a3370f10735806cff0a5c8ae2b9bca4d40

    • SSDEEP

      3072:zR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu3:e25GgFny61mraB

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks