General

  • Target

    1889a4f41fe4053045a502abb252d2877348f052407f358b6d58b81f1834d76f

  • Size

    137KB

  • Sample

    250302-y1bg2atvew

  • MD5

    ac7af93c997f62d01973f9f3bd42e76c

  • SHA1

    1bee8895bbf39a4f0e6ffb9b3baa2922b9a93aad

  • SHA256

    1889a4f41fe4053045a502abb252d2877348f052407f358b6d58b81f1834d76f

  • SHA512

    9f39f6d4e7fc8ddaf450acd470f3501505da420c1214c719ec28b99bb9ae51e98e7880652338dd901eb7aaaf459325d62544b42483b9fe2101edd071de47b42a

  • SSDEEP

    3072:LR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUup:m25GgFny61mraj

Malware Config

Targets

    • Target

      1889a4f41fe4053045a502abb252d2877348f052407f358b6d58b81f1834d76f

    • Size

      137KB

    • MD5

      ac7af93c997f62d01973f9f3bd42e76c

    • SHA1

      1bee8895bbf39a4f0e6ffb9b3baa2922b9a93aad

    • SHA256

      1889a4f41fe4053045a502abb252d2877348f052407f358b6d58b81f1834d76f

    • SHA512

      9f39f6d4e7fc8ddaf450acd470f3501505da420c1214c719ec28b99bb9ae51e98e7880652338dd901eb7aaaf459325d62544b42483b9fe2101edd071de47b42a

    • SSDEEP

      3072:LR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUup:m25GgFny61mraj

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks