General

  • Target

    cea32b3445aeb1a43ac3889678064b877c1b5b966716be7a6199ef8da6a3db46

  • Size

    137KB

  • Sample

    250303-fh5n2sxwgw

  • MD5

    2c00b04e6c2a50153cbaad8dc6311f49

  • SHA1

    a4784d7609c39134abf090e29f9eb9aa0b646a64

  • SHA256

    cea32b3445aeb1a43ac3889678064b877c1b5b966716be7a6199ef8da6a3db46

  • SHA512

    f1e1890500aeed61841c70f47ea6b491c7426d77cfb6988129e5b1018db7eb079f43e65b0a0e82baa10b625114bda4491718e4c7253054c11587ae87fa3f978d

  • SSDEEP

    3072:mR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuM:D25GgFny61mraW

Malware Config

Targets

    • Target

      cea32b3445aeb1a43ac3889678064b877c1b5b966716be7a6199ef8da6a3db46

    • Size

      137KB

    • MD5

      2c00b04e6c2a50153cbaad8dc6311f49

    • SHA1

      a4784d7609c39134abf090e29f9eb9aa0b646a64

    • SHA256

      cea32b3445aeb1a43ac3889678064b877c1b5b966716be7a6199ef8da6a3db46

    • SHA512

      f1e1890500aeed61841c70f47ea6b491c7426d77cfb6988129e5b1018db7eb079f43e65b0a0e82baa10b625114bda4491718e4c7253054c11587ae87fa3f978d

    • SSDEEP

      3072:mR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuM:D25GgFny61mraW

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks