General

  • Target

    d5dc338bfde9301b5ec4485a79a352518fb4d3b999b7ec4d1ccc2d928cc8d814

  • Size

    137KB

  • Sample

    250306-pav93symt3

  • MD5

    435793af70394b8b058af627ff789662

  • SHA1

    0c90b30618e4d8719498ec51d894c71a95e69d71

  • SHA256

    d5dc338bfde9301b5ec4485a79a352518fb4d3b999b7ec4d1ccc2d928cc8d814

  • SHA512

    9e98eb47221b8ffb3aa143bba1b2f17272a3c3813c864ffee1d5c66913fd9980e4a7b930e999b28a5800efced5e20cf70bb584971858c9dc8ce823c910126667

  • SSDEEP

    3072:GR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu1:j25GgFny61mraD

Malware Config

Targets

    • Target

      d5dc338bfde9301b5ec4485a79a352518fb4d3b999b7ec4d1ccc2d928cc8d814

    • Size

      137KB

    • MD5

      435793af70394b8b058af627ff789662

    • SHA1

      0c90b30618e4d8719498ec51d894c71a95e69d71

    • SHA256

      d5dc338bfde9301b5ec4485a79a352518fb4d3b999b7ec4d1ccc2d928cc8d814

    • SHA512

      9e98eb47221b8ffb3aa143bba1b2f17272a3c3813c864ffee1d5c66913fd9980e4a7b930e999b28a5800efced5e20cf70bb584971858c9dc8ce823c910126667

    • SSDEEP

      3072:GR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu1:j25GgFny61mraD

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks