General

  • Target

    38631d13af618e43ff6ebf9ffa739130aa8a3c4006cee88a612f79612f9d0311

  • Size

    137KB

  • Sample

    250303-1yqv2s1ky6

  • MD5

    6d90d89b883187df28e600efa91c625f

  • SHA1

    bdb6ee6e5ae5f05e992759b1ba59d07457db9a7a

  • SHA256

    38631d13af618e43ff6ebf9ffa739130aa8a3c4006cee88a612f79612f9d0311

  • SHA512

    a4947054764855f325685574515c27c98d1eac9b56376ef15688994ee20904b8b80ea0a58f2d38206ab161b50a8b3afa4834a52a0f663e040c3dd2202e205df0

  • SSDEEP

    3072:eR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuX:L25GgFny61mrax

Malware Config

Targets

    • Target

      38631d13af618e43ff6ebf9ffa739130aa8a3c4006cee88a612f79612f9d0311

    • Size

      137KB

    • MD5

      6d90d89b883187df28e600efa91c625f

    • SHA1

      bdb6ee6e5ae5f05e992759b1ba59d07457db9a7a

    • SHA256

      38631d13af618e43ff6ebf9ffa739130aa8a3c4006cee88a612f79612f9d0311

    • SHA512

      a4947054764855f325685574515c27c98d1eac9b56376ef15688994ee20904b8b80ea0a58f2d38206ab161b50a8b3afa4834a52a0f663e040c3dd2202e205df0

    • SSDEEP

      3072:eR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuX:L25GgFny61mrax

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks