General

  • Target

    63a24775a97596ba298f5ba791191c7157dd550857536f5911de3367d3032a0e

  • Size

    137KB

  • Sample

    250306-d1rh2awzgv

  • MD5

    64cb1b10e8d49aad95c9b238928c6953

  • SHA1

    ad05e21b9c5bb201ff3103fcdf81793f036dac9e

  • SHA256

    63a24775a97596ba298f5ba791191c7157dd550857536f5911de3367d3032a0e

  • SHA512

    ee4432338a6a850f7639dd9d59fa6e52b95d1d3a462c412a2c33b552feeca4ab2fea25db2c54d4bf1733b33b39acc2a51449b0688e1047083c98fba17577d7a1

  • SSDEEP

    3072:2R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUul:z25GgFny61mraH

Malware Config

Targets

    • Target

      63a24775a97596ba298f5ba791191c7157dd550857536f5911de3367d3032a0e

    • Size

      137KB

    • MD5

      64cb1b10e8d49aad95c9b238928c6953

    • SHA1

      ad05e21b9c5bb201ff3103fcdf81793f036dac9e

    • SHA256

      63a24775a97596ba298f5ba791191c7157dd550857536f5911de3367d3032a0e

    • SHA512

      ee4432338a6a850f7639dd9d59fa6e52b95d1d3a462c412a2c33b552feeca4ab2fea25db2c54d4bf1733b33b39acc2a51449b0688e1047083c98fba17577d7a1

    • SSDEEP

      3072:2R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUul:z25GgFny61mraH

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks