General

  • Target

    87896cc6d04f9e233adb0fe592285110df6514fda018cbce1a3488e8472618c5

  • Size

    137KB

  • Sample

    250303-b245easpv4

  • MD5

    91d2a8bfcba65ca30a14772a054e8ff1

  • SHA1

    896c26f60da3c3f95cd5fbfcda1a24f4cd9e3856

  • SHA256

    87896cc6d04f9e233adb0fe592285110df6514fda018cbce1a3488e8472618c5

  • SHA512

    1f8cc97bc68c4df1608d2eed1d1420e494d3658fc9fd56456debf2090becaa51f2e96fc4f6847886f7d9901e7f402eba2b270132008d817764f94d94b37d427e

  • SSDEEP

    3072:NR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:A25GgFny61mra

Malware Config

Targets

    • Target

      87896cc6d04f9e233adb0fe592285110df6514fda018cbce1a3488e8472618c5

    • Size

      137KB

    • MD5

      91d2a8bfcba65ca30a14772a054e8ff1

    • SHA1

      896c26f60da3c3f95cd5fbfcda1a24f4cd9e3856

    • SHA256

      87896cc6d04f9e233adb0fe592285110df6514fda018cbce1a3488e8472618c5

    • SHA512

      1f8cc97bc68c4df1608d2eed1d1420e494d3658fc9fd56456debf2090becaa51f2e96fc4f6847886f7d9901e7f402eba2b270132008d817764f94d94b37d427e

    • SSDEEP

      3072:NR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:A25GgFny61mra

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks