General

  • Target

    54e600f5757158c60912becbd0452ef812c40b3116cf6912ece8a5da26178f54

  • Size

    137KB

  • Sample

    250305-bya26avshy

  • MD5

    1513f0b8638bcab0fb493ef337ed37cf

  • SHA1

    612979ce021e5d707d3b1b1265583f9f8ecb393e

  • SHA256

    54e600f5757158c60912becbd0452ef812c40b3116cf6912ece8a5da26178f54

  • SHA512

    867b21e0a0e86e5fb3e93d29b2e42c29130f5ddf95fc97117abd3a9dee92efccfdafd8b2965a5d75082d7c097e5a64a85df54d78ce9b94e2f0a08450f75cf4ca

  • SSDEEP

    3072:1R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuu:Y25GgFny61mraE

Malware Config

Targets

    • Target

      54e600f5757158c60912becbd0452ef812c40b3116cf6912ece8a5da26178f54

    • Size

      137KB

    • MD5

      1513f0b8638bcab0fb493ef337ed37cf

    • SHA1

      612979ce021e5d707d3b1b1265583f9f8ecb393e

    • SHA256

      54e600f5757158c60912becbd0452ef812c40b3116cf6912ece8a5da26178f54

    • SHA512

      867b21e0a0e86e5fb3e93d29b2e42c29130f5ddf95fc97117abd3a9dee92efccfdafd8b2965a5d75082d7c097e5a64a85df54d78ce9b94e2f0a08450f75cf4ca

    • SSDEEP

      3072:1R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuu:Y25GgFny61mraE

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks