General

  • Target

    52d73c185a08cafda0aa18a695ca7a53ddd6747ccaf4a7f935b042621ba929d2

  • Size

    137KB

  • Sample

    250306-b843zsvrx8

  • MD5

    47e6587b4000f64e4bc5c82dba758aef

  • SHA1

    84c7f93a4cfef424315175f95c76980c6cd55251

  • SHA256

    52d73c185a08cafda0aa18a695ca7a53ddd6747ccaf4a7f935b042621ba929d2

  • SHA512

    948e84cd28eea35fbc102228bb3a1dc22440af0326f77185610c4b22e2b024ec086bf3754ea66c89938d6a33599b0608d5e5821c4bad6602539dd0ee4693d995

  • SSDEEP

    3072:OR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuu:b25GgFny61mraY

Malware Config

Targets

    • Target

      52d73c185a08cafda0aa18a695ca7a53ddd6747ccaf4a7f935b042621ba929d2

    • Size

      137KB

    • MD5

      47e6587b4000f64e4bc5c82dba758aef

    • SHA1

      84c7f93a4cfef424315175f95c76980c6cd55251

    • SHA256

      52d73c185a08cafda0aa18a695ca7a53ddd6747ccaf4a7f935b042621ba929d2

    • SHA512

      948e84cd28eea35fbc102228bb3a1dc22440af0326f77185610c4b22e2b024ec086bf3754ea66c89938d6a33599b0608d5e5821c4bad6602539dd0ee4693d995

    • SSDEEP

      3072:OR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuu:b25GgFny61mraY

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks