General

  • Target

    e30a668e66b43c6399a98d8c9b83478068e770ee7971588cb3aad246361739a2

  • Size

    137KB

  • Sample

    250306-qpy5ysznw3

  • MD5

    aeb14d32b117b9ec6d1a6fbbfdb0db6b

  • SHA1

    4677a84f2c3504d2fcdad19a62a1824d56580b80

  • SHA256

    e30a668e66b43c6399a98d8c9b83478068e770ee7971588cb3aad246361739a2

  • SHA512

    d522a1f4cf8da1bbe16cb9d7042fa83b8cc4b1ee45ca9b157c498f8949a691719e79424dae8cebedce4e4c6d1a0f0b41776ec438c846bf66a9a1de549d7d76f1

  • SSDEEP

    3072:bR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuL:W25GgFny61mra5

Malware Config

Targets

    • Target

      e30a668e66b43c6399a98d8c9b83478068e770ee7971588cb3aad246361739a2

    • Size

      137KB

    • MD5

      aeb14d32b117b9ec6d1a6fbbfdb0db6b

    • SHA1

      4677a84f2c3504d2fcdad19a62a1824d56580b80

    • SHA256

      e30a668e66b43c6399a98d8c9b83478068e770ee7971588cb3aad246361739a2

    • SHA512

      d522a1f4cf8da1bbe16cb9d7042fa83b8cc4b1ee45ca9b157c498f8949a691719e79424dae8cebedce4e4c6d1a0f0b41776ec438c846bf66a9a1de549d7d76f1

    • SSDEEP

      3072:bR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuL:W25GgFny61mra5

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks