General

  • Target

    575674e2fb7bd513c65dc1f6975e97ff1af84c92892bcb52e5ffa87a8f777efc

  • Size

    137KB

  • Sample

    250306-cqjvrswl19

  • MD5

    6a33b6e87a17a8a45907adc675c01cf4

  • SHA1

    4b8ca530574f775086e9c5b7a02a3856453c7d24

  • SHA256

    575674e2fb7bd513c65dc1f6975e97ff1af84c92892bcb52e5ffa87a8f777efc

  • SHA512

    60f4ccea934a2b76e75d341654de517583ec7f31a4e03e17608bad1f2a6fed80b1c154856d81ffecf780371518c4cc8fe3b102d29747659efe464af016e71cbd

  • SSDEEP

    3072:WR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuI:T25GgFny61mra6

Malware Config

Targets

    • Target

      575674e2fb7bd513c65dc1f6975e97ff1af84c92892bcb52e5ffa87a8f777efc

    • Size

      137KB

    • MD5

      6a33b6e87a17a8a45907adc675c01cf4

    • SHA1

      4b8ca530574f775086e9c5b7a02a3856453c7d24

    • SHA256

      575674e2fb7bd513c65dc1f6975e97ff1af84c92892bcb52e5ffa87a8f777efc

    • SHA512

      60f4ccea934a2b76e75d341654de517583ec7f31a4e03e17608bad1f2a6fed80b1c154856d81ffecf780371518c4cc8fe3b102d29747659efe464af016e71cbd

    • SSDEEP

      3072:WR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuI:T25GgFny61mra6

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks