General

  • Target

    18c2663bedce7f2ca497f25c206ea377b6a966614e0acd194bb9613f1d2270b9

  • Size

    137KB

  • Sample

    250303-y9x3dsx1gy

  • MD5

    be9379f9d03927aa341b48410c17c459

  • SHA1

    c0702d064b8abc199cec73dba0539c541715f4b0

  • SHA256

    18c2663bedce7f2ca497f25c206ea377b6a966614e0acd194bb9613f1d2270b9

  • SHA512

    e47f0611a8c4c687e5fc7a598f78bd1b4efc48ed4a16344c5e1f42038fefe4c38170ed9cbb6b2da076d01dc619eef5f3b8d566b918a18f8ada76c96e181a9729

  • SSDEEP

    3072:rR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuQ:G25GgFny61mraK

Malware Config

Targets

    • Target

      18c2663bedce7f2ca497f25c206ea377b6a966614e0acd194bb9613f1d2270b9

    • Size

      137KB

    • MD5

      be9379f9d03927aa341b48410c17c459

    • SHA1

      c0702d064b8abc199cec73dba0539c541715f4b0

    • SHA256

      18c2663bedce7f2ca497f25c206ea377b6a966614e0acd194bb9613f1d2270b9

    • SHA512

      e47f0611a8c4c687e5fc7a598f78bd1b4efc48ed4a16344c5e1f42038fefe4c38170ed9cbb6b2da076d01dc619eef5f3b8d566b918a18f8ada76c96e181a9729

    • SSDEEP

      3072:rR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuQ:G25GgFny61mraK

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks