General

  • Target

    054f6b9acce873cbd0267571c8d106897915db251cef4564dc8278a355efd922

  • Size

    137KB

  • Sample

    250302-x1b8wsssdy

  • MD5

    13df48718f22e45e34ce0d63e4bcc85b

  • SHA1

    cedd186cac1ce45eeee69e2521e5bd43f134b1d3

  • SHA256

    054f6b9acce873cbd0267571c8d106897915db251cef4564dc8278a355efd922

  • SHA512

    2acb5bc0eb666121aa6f8ea4741e0f2e657477935870fc2e825f3ed7c23f7dda9a52986bc77a913a57e22afe7a3aea2839905527935eee6694a88c41be0e5282

  • SSDEEP

    3072:mR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu+:D25GgFny61mra0

Malware Config

Targets

    • Target

      054f6b9acce873cbd0267571c8d106897915db251cef4564dc8278a355efd922

    • Size

      137KB

    • MD5

      13df48718f22e45e34ce0d63e4bcc85b

    • SHA1

      cedd186cac1ce45eeee69e2521e5bd43f134b1d3

    • SHA256

      054f6b9acce873cbd0267571c8d106897915db251cef4564dc8278a355efd922

    • SHA512

      2acb5bc0eb666121aa6f8ea4741e0f2e657477935870fc2e825f3ed7c23f7dda9a52986bc77a913a57e22afe7a3aea2839905527935eee6694a88c41be0e5282

    • SSDEEP

      3072:mR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu+:D25GgFny61mra0

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks