General

  • Target

    2e006646ce24b234f6efe68207b5b4565ba9ab7c089c60e8d7fa09f9c02fb98c

  • Size

    137KB

  • Sample

    250307-am65sa1nv7

  • MD5

    66a2ef0c9ece3dec60ad62f72b97fefd

  • SHA1

    e498e36aa66b0767bff0d0bb657953dc8f30a281

  • SHA256

    2e006646ce24b234f6efe68207b5b4565ba9ab7c089c60e8d7fa09f9c02fb98c

  • SHA512

    d0d0f05610c70d647663e24cca7c887af1e543720e08be1d6ffb2807e6049d8b4d2ddcd3dd8de605eb81256274363a8fa7caf078f883f9d0ede830264a0e8902

  • SSDEEP

    3072:HR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuf:625GgFny61mraF

Malware Config

Targets

    • Target

      2e006646ce24b234f6efe68207b5b4565ba9ab7c089c60e8d7fa09f9c02fb98c

    • Size

      137KB

    • MD5

      66a2ef0c9ece3dec60ad62f72b97fefd

    • SHA1

      e498e36aa66b0767bff0d0bb657953dc8f30a281

    • SHA256

      2e006646ce24b234f6efe68207b5b4565ba9ab7c089c60e8d7fa09f9c02fb98c

    • SHA512

      d0d0f05610c70d647663e24cca7c887af1e543720e08be1d6ffb2807e6049d8b4d2ddcd3dd8de605eb81256274363a8fa7caf078f883f9d0ede830264a0e8902

    • SSDEEP

      3072:HR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuf:625GgFny61mraF

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks