General

  • Target

    e4e6f139c7cbccfffad590faf107773668d72e949423f3d7993af388ae3d982e

  • Size

    137KB

  • Sample

    250303-gm8ryayza1

  • MD5

    b623e353aa9ddd34e354a635422d970b

  • SHA1

    372de1f1d11c376b309e8aa12320cda89770feba

  • SHA256

    e4e6f139c7cbccfffad590faf107773668d72e949423f3d7993af388ae3d982e

  • SHA512

    f380640fc5675f798fa78339a1220a951104b8191b058e54b5d2f29cc8d6d9df8dd390e2ff3693ac5f5372315d108b7572bb5b63f5321b2b62bc46deb81474bb

  • SSDEEP

    3072:WR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuM:T25GgFny61mraa

Malware Config

Targets

    • Target

      e4e6f139c7cbccfffad590faf107773668d72e949423f3d7993af388ae3d982e

    • Size

      137KB

    • MD5

      b623e353aa9ddd34e354a635422d970b

    • SHA1

      372de1f1d11c376b309e8aa12320cda89770feba

    • SHA256

      e4e6f139c7cbccfffad590faf107773668d72e949423f3d7993af388ae3d982e

    • SHA512

      f380640fc5675f798fa78339a1220a951104b8191b058e54b5d2f29cc8d6d9df8dd390e2ff3693ac5f5372315d108b7572bb5b63f5321b2b62bc46deb81474bb

    • SSDEEP

      3072:WR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuM:T25GgFny61mraa

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks