General

  • Target

    afa232bb2879f2fa97358cbb3473509ed3209b465c916b12b3f6a179e4399420

  • Size

    137KB

  • Sample

    250308-nx6tnawwev

  • MD5

    6422660d4a8bfa9a33ae1dfc99a4d634

  • SHA1

    940a5afff585791164534c9100a87941fa4515f5

  • SHA256

    afa232bb2879f2fa97358cbb3473509ed3209b465c916b12b3f6a179e4399420

  • SHA512

    96449a6891a0abe837a72aa79630f7d03a84d715f3ec45e07aa9be021a6a745a3501461ddde793ae3c731ef82647148d31c014e8f29c371d9357005faa08f934

  • SSDEEP

    3072:lR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:o25GgFny61mra

Malware Config

Targets

    • Target

      afa232bb2879f2fa97358cbb3473509ed3209b465c916b12b3f6a179e4399420

    • Size

      137KB

    • MD5

      6422660d4a8bfa9a33ae1dfc99a4d634

    • SHA1

      940a5afff585791164534c9100a87941fa4515f5

    • SHA256

      afa232bb2879f2fa97358cbb3473509ed3209b465c916b12b3f6a179e4399420

    • SHA512

      96449a6891a0abe837a72aa79630f7d03a84d715f3ec45e07aa9be021a6a745a3501461ddde793ae3c731ef82647148d31c014e8f29c371d9357005faa08f934

    • SSDEEP

      3072:lR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:o25GgFny61mra

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks