General

  • Target

    9f234b5b80e5c912e240e63c826aeaf770434d12de9e13e121f69723930d57eb

  • Size

    137KB

  • Sample

    250304-eynvss1jz3

  • MD5

    6ae405f158cda413b1bbeaeecd67c570

  • SHA1

    bd3776989d16552b3d47ab17dbacbccf2f3abfaf

  • SHA256

    9f234b5b80e5c912e240e63c826aeaf770434d12de9e13e121f69723930d57eb

  • SHA512

    37b9e64510df07f0a1946b314342990150d8dcdd176586ae2e12481585b952f243b5f7c16a4578611ae352a9600d2bca5e0d5809020aaeec6efa521d879cfa85

  • SSDEEP

    3072:sR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu7:Z25GgFny61mraB

Malware Config

Targets

    • Target

      9f234b5b80e5c912e240e63c826aeaf770434d12de9e13e121f69723930d57eb

    • Size

      137KB

    • MD5

      6ae405f158cda413b1bbeaeecd67c570

    • SHA1

      bd3776989d16552b3d47ab17dbacbccf2f3abfaf

    • SHA256

      9f234b5b80e5c912e240e63c826aeaf770434d12de9e13e121f69723930d57eb

    • SHA512

      37b9e64510df07f0a1946b314342990150d8dcdd176586ae2e12481585b952f243b5f7c16a4578611ae352a9600d2bca5e0d5809020aaeec6efa521d879cfa85

    • SSDEEP

      3072:sR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu7:Z25GgFny61mraB

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks