General

  • Target

    4ed1af6f563a9a64da15ea6f6291e6e03f1a8f1c4cfc374d231252dc54a257d2

  • Size

    137KB

  • Sample

    250309-3kqz1avpw7

  • MD5

    35718b10fc4e69ba46cc72be3d36773f

  • SHA1

    b2ee7dd177ac8d2dfda2d8cfa27061c68e9f01b4

  • SHA256

    4ed1af6f563a9a64da15ea6f6291e6e03f1a8f1c4cfc374d231252dc54a257d2

  • SHA512

    5bac2c655000aa33e4bd7b5a221c88b65754ee080dc07274de66a8868fe1269f60a4971c2b9c223748e83d2a26b353a7f682880be2708fc1b3da50af9091703a

  • SSDEEP

    3072:8R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:J25GgFny61mra

Malware Config

Targets

    • Target

      4ed1af6f563a9a64da15ea6f6291e6e03f1a8f1c4cfc374d231252dc54a257d2

    • Size

      137KB

    • MD5

      35718b10fc4e69ba46cc72be3d36773f

    • SHA1

      b2ee7dd177ac8d2dfda2d8cfa27061c68e9f01b4

    • SHA256

      4ed1af6f563a9a64da15ea6f6291e6e03f1a8f1c4cfc374d231252dc54a257d2

    • SHA512

      5bac2c655000aa33e4bd7b5a221c88b65754ee080dc07274de66a8868fe1269f60a4971c2b9c223748e83d2a26b353a7f682880be2708fc1b3da50af9091703a

    • SSDEEP

      3072:8R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:J25GgFny61mra

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks