General

  • Target

    e29d959804d320f3ab8ede1b693a2ead053b6023510980f0c70c7c65868e4e9a

  • Size

    137KB

  • Sample

    250303-gjsasazks5

  • MD5

    18c47d5a391f84f4d4adc2f55424a3f6

  • SHA1

    7aade150a5091fb0ec0828c75c8de361ba812eae

  • SHA256

    e29d959804d320f3ab8ede1b693a2ead053b6023510980f0c70c7c65868e4e9a

  • SHA512

    0b68983319e1b18351c6c72a9ce56a69912413648eaedc325013c1f5e86d5c33ae27d4b35bee2930c6a590bf19fb34359fefc5eee3d8d21c3435ed6a17b13896

  • SSDEEP

    3072:/R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu6:C25GgFny61mrao

Malware Config

Targets

    • Target

      e29d959804d320f3ab8ede1b693a2ead053b6023510980f0c70c7c65868e4e9a

    • Size

      137KB

    • MD5

      18c47d5a391f84f4d4adc2f55424a3f6

    • SHA1

      7aade150a5091fb0ec0828c75c8de361ba812eae

    • SHA256

      e29d959804d320f3ab8ede1b693a2ead053b6023510980f0c70c7c65868e4e9a

    • SHA512

      0b68983319e1b18351c6c72a9ce56a69912413648eaedc325013c1f5e86d5c33ae27d4b35bee2930c6a590bf19fb34359fefc5eee3d8d21c3435ed6a17b13896

    • SSDEEP

      3072:/R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu6:C25GgFny61mrao

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks