General

  • Target

    bca945c9fa834c070c3c4224429c65123ea091fe7ca0dee41566e0afc603320a

  • Size

    137KB

  • Sample

    250304-gybxcatjy3

  • MD5

    d3b7bed6d5892f5dddd9e8ec2edbcb03

  • SHA1

    ab7d52602d7d8e27e4ece2e0c3adbd754fe59ed6

  • SHA256

    bca945c9fa834c070c3c4224429c65123ea091fe7ca0dee41566e0afc603320a

  • SHA512

    ba8d95f5651b11fdb69256f523585f9df6f79a83f9ea5a03abdf9a38c37c1695e2377a647d8d901692d0cba678b0e5f12c54a681f7ec2fcdcb55c8c7c234a7c4

  • SSDEEP

    3072:UR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu0:R25GgFny61mrai

Malware Config

Targets

    • Target

      bca945c9fa834c070c3c4224429c65123ea091fe7ca0dee41566e0afc603320a

    • Size

      137KB

    • MD5

      d3b7bed6d5892f5dddd9e8ec2edbcb03

    • SHA1

      ab7d52602d7d8e27e4ece2e0c3adbd754fe59ed6

    • SHA256

      bca945c9fa834c070c3c4224429c65123ea091fe7ca0dee41566e0afc603320a

    • SHA512

      ba8d95f5651b11fdb69256f523585f9df6f79a83f9ea5a03abdf9a38c37c1695e2377a647d8d901692d0cba678b0e5f12c54a681f7ec2fcdcb55c8c7c234a7c4

    • SSDEEP

      3072:UR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu0:R25GgFny61mrai

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks