General

  • Target

    f0e2669109f9afda4b88e0ad1966274fa1ae997d37973385925ae17221d413b2

  • Size

    137KB

  • Sample

    250303-g7ve2szwdt

  • MD5

    9ad6bdcb654df28a4f781d5faf3a0def

  • SHA1

    c2848b506a1ebba820973ea6a77adc9c2546a547

  • SHA256

    f0e2669109f9afda4b88e0ad1966274fa1ae997d37973385925ae17221d413b2

  • SHA512

    b48d8af65e83e504a8dcc04562dfbb5bc1bf1972c2425d72196beb147bee9a01ee4b3ba38433b0a5d87b5e653ffab3241e37408cc50d2df6c46a6245ad3824b0

  • SSDEEP

    3072:RR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuw:825GgFny61mrai

Malware Config

Targets

    • Target

      f0e2669109f9afda4b88e0ad1966274fa1ae997d37973385925ae17221d413b2

    • Size

      137KB

    • MD5

      9ad6bdcb654df28a4f781d5faf3a0def

    • SHA1

      c2848b506a1ebba820973ea6a77adc9c2546a547

    • SHA256

      f0e2669109f9afda4b88e0ad1966274fa1ae997d37973385925ae17221d413b2

    • SHA512

      b48d8af65e83e504a8dcc04562dfbb5bc1bf1972c2425d72196beb147bee9a01ee4b3ba38433b0a5d87b5e653ffab3241e37408cc50d2df6c46a6245ad3824b0

    • SSDEEP

      3072:RR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuw:825GgFny61mrai

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks