General

  • Target

    6679538ea48619a8739f2d9ee70c1c23843437245aab4ed387f8826f1ff2a9aa

  • Size

    137KB

  • Sample

    250306-d8bgsaxqy7

  • MD5

    21686af496a9759f08456c0161b05274

  • SHA1

    d1db5d34a657b82261185935a14ebc2c373138e6

  • SHA256

    6679538ea48619a8739f2d9ee70c1c23843437245aab4ed387f8826f1ff2a9aa

  • SHA512

    f03f04eb4a8cf7d482d0313f50a5d58c0b2d429379a6de4684c05bd6e6f9b6659d359fd6acf8b5caf85ccab3671eeec4171ae6acab149a5665c1a52a06fb6bbe

  • SSDEEP

    3072:ER02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuO:h25GgFny61mra8

Malware Config

Targets

    • Target

      6679538ea48619a8739f2d9ee70c1c23843437245aab4ed387f8826f1ff2a9aa

    • Size

      137KB

    • MD5

      21686af496a9759f08456c0161b05274

    • SHA1

      d1db5d34a657b82261185935a14ebc2c373138e6

    • SHA256

      6679538ea48619a8739f2d9ee70c1c23843437245aab4ed387f8826f1ff2a9aa

    • SHA512

      f03f04eb4a8cf7d482d0313f50a5d58c0b2d429379a6de4684c05bd6e6f9b6659d359fd6acf8b5caf85ccab3671eeec4171ae6acab149a5665c1a52a06fb6bbe

    • SSDEEP

      3072:ER02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuO:h25GgFny61mra8

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks