General

  • Target

    b5fe600b0402c3da44b7355bd02a913c33032d40a2d05efe7975245a7276f22b

  • Size

    137KB

  • Sample

    250302-ehqz8atxcy

  • MD5

    9b0bdfb5d5a488f1c01783d702f53b2f

  • SHA1

    92ced42ad358422af8a68cc110f7eb3e3117a3f2

  • SHA256

    b5fe600b0402c3da44b7355bd02a913c33032d40a2d05efe7975245a7276f22b

  • SHA512

    94e81f3166b742bc448a1e3be28e44d329763dcddce87bedd52fb2badea8c14c19cd30b0e017832bf65275f96cc515b521bb9c171806468ba4bb02cb27358808

  • SSDEEP

    3072:HR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUus:625GgFny61mraK

Malware Config

Targets

    • Target

      b5fe600b0402c3da44b7355bd02a913c33032d40a2d05efe7975245a7276f22b

    • Size

      137KB

    • MD5

      9b0bdfb5d5a488f1c01783d702f53b2f

    • SHA1

      92ced42ad358422af8a68cc110f7eb3e3117a3f2

    • SHA256

      b5fe600b0402c3da44b7355bd02a913c33032d40a2d05efe7975245a7276f22b

    • SHA512

      94e81f3166b742bc448a1e3be28e44d329763dcddce87bedd52fb2badea8c14c19cd30b0e017832bf65275f96cc515b521bb9c171806468ba4bb02cb27358808

    • SSDEEP

      3072:HR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUus:625GgFny61mraK

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks