General

  • Target

    1bc50e8010a8cbe8abb1383ceab8487214086d3fcecfb85f0920a506255a6bf9

  • Size

    137KB

  • Sample

    250302-y72msstxew

  • MD5

    fb0420384f5ae0b7c7e15eb7db6a3b0b

  • SHA1

    2b4521c99293631e205319dee7ea82209a138967

  • SHA256

    1bc50e8010a8cbe8abb1383ceab8487214086d3fcecfb85f0920a506255a6bf9

  • SHA512

    357b83654a82c6409e5bda75695f11dd21ca79a38ea465b94196561f6a9a7d42b9461383f4775de67d42ac865f583462551fd04f77738bf86348cc70bc1d2c66

  • SSDEEP

    3072:0R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuR:x25GgFny61mrav

Malware Config

Targets

    • Target

      1bc50e8010a8cbe8abb1383ceab8487214086d3fcecfb85f0920a506255a6bf9

    • Size

      137KB

    • MD5

      fb0420384f5ae0b7c7e15eb7db6a3b0b

    • SHA1

      2b4521c99293631e205319dee7ea82209a138967

    • SHA256

      1bc50e8010a8cbe8abb1383ceab8487214086d3fcecfb85f0920a506255a6bf9

    • SHA512

      357b83654a82c6409e5bda75695f11dd21ca79a38ea465b94196561f6a9a7d42b9461383f4775de67d42ac865f583462551fd04f77738bf86348cc70bc1d2c66

    • SSDEEP

      3072:0R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuR:x25GgFny61mrav

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks