General

  • Target

    3131d152af9f43f500e037c7e9cde884643cf247cfe2a0810dffbf0073ce16b9

  • Size

    137KB

  • Sample

    250305-2tkzns1wgy

  • MD5

    53453f042ae0136573149d2a2ec69636

  • SHA1

    d7d58e5c8c5ce72848ca934564a6ca03c85664e0

  • SHA256

    3131d152af9f43f500e037c7e9cde884643cf247cfe2a0810dffbf0073ce16b9

  • SHA512

    92996e2df39483bfef79978769dae2f8ab643b95845fdbdd0e7a4ca7dddd5101e2a1270165c4472557fb6583c42637f234a107bc63a13055b2bc651b831c9ce1

  • SSDEEP

    3072:9R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuK:Q25GgFny61mraA

Malware Config

Targets

    • Target

      3131d152af9f43f500e037c7e9cde884643cf247cfe2a0810dffbf0073ce16b9

    • Size

      137KB

    • MD5

      53453f042ae0136573149d2a2ec69636

    • SHA1

      d7d58e5c8c5ce72848ca934564a6ca03c85664e0

    • SHA256

      3131d152af9f43f500e037c7e9cde884643cf247cfe2a0810dffbf0073ce16b9

    • SHA512

      92996e2df39483bfef79978769dae2f8ab643b95845fdbdd0e7a4ca7dddd5101e2a1270165c4472557fb6583c42637f234a107bc63a13055b2bc651b831c9ce1

    • SSDEEP

      3072:9R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuK:Q25GgFny61mraA

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks