General

  • Target

    fe92c6548ab93637132bc12a469eab3d36d71974f9841f9fc6f99ebac159d610

  • Size

    137KB

  • Sample

    250309-at4y1awtd1

  • MD5

    62b5d2e99d839d618e07fb00a38b314a

  • SHA1

    c1170c5664151ba9fa8478e937d223d94008b27f

  • SHA256

    fe92c6548ab93637132bc12a469eab3d36d71974f9841f9fc6f99ebac159d610

  • SHA512

    ef72256784bc835fe5c39c5bacca05b849a36957095c8b1515438a87d8b8f327f74f794e57fe12adeb8fbfab7cf7498bb34a11e01bfaab7bbf767e5fa9142993

  • SSDEEP

    3072:kR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:B25GgFny61mra

Malware Config

Targets

    • Target

      fe92c6548ab93637132bc12a469eab3d36d71974f9841f9fc6f99ebac159d610

    • Size

      137KB

    • MD5

      62b5d2e99d839d618e07fb00a38b314a

    • SHA1

      c1170c5664151ba9fa8478e937d223d94008b27f

    • SHA256

      fe92c6548ab93637132bc12a469eab3d36d71974f9841f9fc6f99ebac159d610

    • SHA512

      ef72256784bc835fe5c39c5bacca05b849a36957095c8b1515438a87d8b8f327f74f794e57fe12adeb8fbfab7cf7498bb34a11e01bfaab7bbf767e5fa9142993

    • SSDEEP

      3072:kR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu:B25GgFny61mra

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks