General

  • Target

    210b864edcf937fa3d9d701a7a1777ebc507e68926c6b130f4f9934581871491

  • Size

    137KB

  • Sample

    250306-2gcgrszmw5

  • MD5

    dfc8c7ed3b29b01dd58069a8dfc9e698

  • SHA1

    44719b36874e9f6d6e08437df7588ae508f0468b

  • SHA256

    210b864edcf937fa3d9d701a7a1777ebc507e68926c6b130f4f9934581871491

  • SHA512

    af9caed0fc1cdbd5b672017d808c6c92e88a39dd5c1a12daf3f4cc87b7884950c6653d16579d9f77ac813e7d65e5831f65d8e8f06958f4dc0a75f9d1031c3c90

  • SSDEEP

    3072:sR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:Z25GgFny61mra

Malware Config

Targets

    • Target

      210b864edcf937fa3d9d701a7a1777ebc507e68926c6b130f4f9934581871491

    • Size

      137KB

    • MD5

      dfc8c7ed3b29b01dd58069a8dfc9e698

    • SHA1

      44719b36874e9f6d6e08437df7588ae508f0468b

    • SHA256

      210b864edcf937fa3d9d701a7a1777ebc507e68926c6b130f4f9934581871491

    • SHA512

      af9caed0fc1cdbd5b672017d808c6c92e88a39dd5c1a12daf3f4cc87b7884950c6653d16579d9f77ac813e7d65e5831f65d8e8f06958f4dc0a75f9d1031c3c90

    • SSDEEP

      3072:sR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:Z25GgFny61mra

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks