General

  • Target

    f56ac872713659451c67a1a7e5e50f402c81f5975fcd93a466277c7425ba573e

  • Size

    137KB

  • Sample

    250306-sa76es1tdy

  • MD5

    2ca6591eeb9e7d4c09f6fd3edbe9d1be

  • SHA1

    c21cd04730d8b37732411768f75b70fabe9be40e

  • SHA256

    f56ac872713659451c67a1a7e5e50f402c81f5975fcd93a466277c7425ba573e

  • SHA512

    44511407ca10e70ad0374c57e4ff39d6c559b20badb309fb06e5697e5bb54b5105bb3e857d71381311133dc3555b9fe3fff9a8743864e508d32509aa2771eede

  • SSDEEP

    3072:mR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuY:D25GgFny61mra+

Malware Config

Targets

    • Target

      f56ac872713659451c67a1a7e5e50f402c81f5975fcd93a466277c7425ba573e

    • Size

      137KB

    • MD5

      2ca6591eeb9e7d4c09f6fd3edbe9d1be

    • SHA1

      c21cd04730d8b37732411768f75b70fabe9be40e

    • SHA256

      f56ac872713659451c67a1a7e5e50f402c81f5975fcd93a466277c7425ba573e

    • SHA512

      44511407ca10e70ad0374c57e4ff39d6c559b20badb309fb06e5697e5bb54b5105bb3e857d71381311133dc3555b9fe3fff9a8743864e508d32509aa2771eede

    • SSDEEP

      3072:mR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuY:D25GgFny61mra+

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks