General

  • Target

    97d565555769295f3bd4e2451be64899748416bd3bde7aaca1e16dd5f67cb5ef

  • Size

    137KB

  • Sample

    250303-crangstns5

  • MD5

    e634c1841d991e354d6f50dd51a717b9

  • SHA1

    ecf8edff72044afb15084f52353ae0b44d002989

  • SHA256

    97d565555769295f3bd4e2451be64899748416bd3bde7aaca1e16dd5f67cb5ef

  • SHA512

    fb7395134e1610045791af4ec760ad09bc8e2249724f90794bcd84f6d7e7f62557adb5889a477ed5f618485d479af4637a9fae513691cafb1f826c602d7d1b76

  • SSDEEP

    3072:XR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuN:q25GgFny61mraT

Malware Config

Targets

    • Target

      97d565555769295f3bd4e2451be64899748416bd3bde7aaca1e16dd5f67cb5ef

    • Size

      137KB

    • MD5

      e634c1841d991e354d6f50dd51a717b9

    • SHA1

      ecf8edff72044afb15084f52353ae0b44d002989

    • SHA256

      97d565555769295f3bd4e2451be64899748416bd3bde7aaca1e16dd5f67cb5ef

    • SHA512

      fb7395134e1610045791af4ec760ad09bc8e2249724f90794bcd84f6d7e7f62557adb5889a477ed5f618485d479af4637a9fae513691cafb1f826c602d7d1b76

    • SSDEEP

      3072:XR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuN:q25GgFny61mraT

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks