General

  • Target

    db5d4e3b0693ba3003de1321f61d9bd75886c54095ea3500cc95479a77258e54

  • Size

    137KB

  • Sample

    250306-p5yzfsywb1

  • MD5

    41d39994598efec3cae644819893cb66

  • SHA1

    41abed9c00de718d43df984029036404561e2109

  • SHA256

    db5d4e3b0693ba3003de1321f61d9bd75886c54095ea3500cc95479a77258e54

  • SHA512

    2241dd28d4f574d8969ff6fda359d980b19f220c8b3a035e9ef104ee0df517cc63a3298b6616a315ba60d7d03fbc32accf9a370d850137fc1595958b8365a74f

  • SSDEEP

    3072:WR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:T25GgFny61mra

Malware Config

Targets

    • Target

      db5d4e3b0693ba3003de1321f61d9bd75886c54095ea3500cc95479a77258e54

    • Size

      137KB

    • MD5

      41d39994598efec3cae644819893cb66

    • SHA1

      41abed9c00de718d43df984029036404561e2109

    • SHA256

      db5d4e3b0693ba3003de1321f61d9bd75886c54095ea3500cc95479a77258e54

    • SHA512

      2241dd28d4f574d8969ff6fda359d980b19f220c8b3a035e9ef104ee0df517cc63a3298b6616a315ba60d7d03fbc32accf9a370d850137fc1595958b8365a74f

    • SSDEEP

      3072:WR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:T25GgFny61mra

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks