General

  • Target

    4d0739e29fbb0ac6129a7d9346181cd57007829a4effc5b109ffd2f076b48ada

  • Size

    137KB

  • Sample

    250306-bf23xsvlt5

  • MD5

    256239d6d93f9bfec7e11ade687a349f

  • SHA1

    1248f96c11c35b9777be49372e19ff0614fe831d

  • SHA256

    4d0739e29fbb0ac6129a7d9346181cd57007829a4effc5b109ffd2f076b48ada

  • SHA512

    e8cad613e22f395e5c88051157f7d65bca1b026c1b88b9dd7b108bc68862be94ffcb8ca3cbff41930936a570b9c01daad6782efc8ea16a98af0d9b5e957cf649

  • SSDEEP

    3072:IR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuq:d25GgFny61mraQ

Malware Config

Targets

    • Target

      4d0739e29fbb0ac6129a7d9346181cd57007829a4effc5b109ffd2f076b48ada

    • Size

      137KB

    • MD5

      256239d6d93f9bfec7e11ade687a349f

    • SHA1

      1248f96c11c35b9777be49372e19ff0614fe831d

    • SHA256

      4d0739e29fbb0ac6129a7d9346181cd57007829a4effc5b109ffd2f076b48ada

    • SHA512

      e8cad613e22f395e5c88051157f7d65bca1b026c1b88b9dd7b108bc68862be94ffcb8ca3cbff41930936a570b9c01daad6782efc8ea16a98af0d9b5e957cf649

    • SSDEEP

      3072:IR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuq:d25GgFny61mraQ

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks