General

  • Target

    f6583e27aa8b2359843bf795db66c535495de14e51afa21b0bf5af84692e297d

  • Size

    137KB

  • Sample

    250303-hey37s1j13

  • MD5

    7b272ddd99c4860b50a2103408c55490

  • SHA1

    26b6a4b0377e95c810f835e2446f24e48c18081c

  • SHA256

    f6583e27aa8b2359843bf795db66c535495de14e51afa21b0bf5af84692e297d

  • SHA512

    b2f3a436bb768e97640e0b34ed766b3d89e694d86d047fef5274e08264a5f1c0ec03dacbc3fde9703541da1e149f27e9aa79e25154c5ea11693bb86fae629188

  • SSDEEP

    3072:fR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUug:i25GgFny61mraK

Malware Config

Targets

    • Target

      f6583e27aa8b2359843bf795db66c535495de14e51afa21b0bf5af84692e297d

    • Size

      137KB

    • MD5

      7b272ddd99c4860b50a2103408c55490

    • SHA1

      26b6a4b0377e95c810f835e2446f24e48c18081c

    • SHA256

      f6583e27aa8b2359843bf795db66c535495de14e51afa21b0bf5af84692e297d

    • SHA512

      b2f3a436bb768e97640e0b34ed766b3d89e694d86d047fef5274e08264a5f1c0ec03dacbc3fde9703541da1e149f27e9aa79e25154c5ea11693bb86fae629188

    • SSDEEP

      3072:fR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUug:i25GgFny61mraK

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks