General

  • Target

    ba23ee09e603d260c4cd458e1269c79cce7988d82f41494f7639a5740c13065e

  • Size

    137KB

  • Sample

    250304-gsyh6asrv2

  • MD5

    306adff5489da3f19eb8344d2d9f7aa2

  • SHA1

    b839577d3c900b7065a0a6b91ac38aeda0b6b7c0

  • SHA256

    ba23ee09e603d260c4cd458e1269c79cce7988d82f41494f7639a5740c13065e

  • SHA512

    50e07ffa6dde7ce861573f750779656115ccc04f852339ea26f804771af82662163c41a8b283bf1126eede44437ed461ff6d5e4c6124a9d5eaeffca5e9021f79

  • SSDEEP

    3072:TR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUus:+25GgFny61mraC

Malware Config

Targets

    • Target

      ba23ee09e603d260c4cd458e1269c79cce7988d82f41494f7639a5740c13065e

    • Size

      137KB

    • MD5

      306adff5489da3f19eb8344d2d9f7aa2

    • SHA1

      b839577d3c900b7065a0a6b91ac38aeda0b6b7c0

    • SHA256

      ba23ee09e603d260c4cd458e1269c79cce7988d82f41494f7639a5740c13065e

    • SHA512

      50e07ffa6dde7ce861573f750779656115ccc04f852339ea26f804771af82662163c41a8b283bf1126eede44437ed461ff6d5e4c6124a9d5eaeffca5e9021f79

    • SSDEEP

      3072:TR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUus:+25GgFny61mraC

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks