General

  • Target

    e04aba0e0f6a4aca9da4d5edf558e9d6d536d6d8e3d67df3a119a0ebe7a32d0c

  • Size

    137KB

  • Sample

    250305-njg85sxmz5

  • MD5

    8bdcaab64127c866f997b01440c527d5

  • SHA1

    83dfa4a2ceca9615fbe58db0c0d2885fdba201dd

  • SHA256

    e04aba0e0f6a4aca9da4d5edf558e9d6d536d6d8e3d67df3a119a0ebe7a32d0c

  • SHA512

    8af721e4921aef2488e07a05cfe7b5f72ed044f81eccff243b5863335c7ceb046211a2bbeec28b2fc42b9157ab1bb657b9e7d88f19a31db635faef1d5b3bddb5

  • SSDEEP

    3072:3R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUui:K25GgFny61mraE

Malware Config

Targets

    • Target

      e04aba0e0f6a4aca9da4d5edf558e9d6d536d6d8e3d67df3a119a0ebe7a32d0c

    • Size

      137KB

    • MD5

      8bdcaab64127c866f997b01440c527d5

    • SHA1

      83dfa4a2ceca9615fbe58db0c0d2885fdba201dd

    • SHA256

      e04aba0e0f6a4aca9da4d5edf558e9d6d536d6d8e3d67df3a119a0ebe7a32d0c

    • SHA512

      8af721e4921aef2488e07a05cfe7b5f72ed044f81eccff243b5863335c7ceb046211a2bbeec28b2fc42b9157ab1bb657b9e7d88f19a31db635faef1d5b3bddb5

    • SSDEEP

      3072:3R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUui:K25GgFny61mraE

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks