General

  • Target

    0444884fe873ca252cd308d81b0046fe4934a51bc240a9d431e64963fb538e8e

  • Size

    137KB

  • Sample

    250309-x3pxrsymz8

  • MD5

    77eb0100fbff8ca64c9861caacd0a2f7

  • SHA1

    9a2ad94d40f315645fe56d8bd8a95195bacc8ab3

  • SHA256

    0444884fe873ca252cd308d81b0046fe4934a51bc240a9d431e64963fb538e8e

  • SHA512

    fa91154c08e4edd3d1cec6ad78fbb013fe76ee5ffaad8a9945a15982018f6527aa1f76ea9319f0dd50c2bd76bd843811a03df25712085fa60f87bc22f8fa6fc9

  • SSDEEP

    3072:eR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUur:L25GgFny61mraN

Malware Config

Targets

    • Target

      0444884fe873ca252cd308d81b0046fe4934a51bc240a9d431e64963fb538e8e

    • Size

      137KB

    • MD5

      77eb0100fbff8ca64c9861caacd0a2f7

    • SHA1

      9a2ad94d40f315645fe56d8bd8a95195bacc8ab3

    • SHA256

      0444884fe873ca252cd308d81b0046fe4934a51bc240a9d431e64963fb538e8e

    • SHA512

      fa91154c08e4edd3d1cec6ad78fbb013fe76ee5ffaad8a9945a15982018f6527aa1f76ea9319f0dd50c2bd76bd843811a03df25712085fa60f87bc22f8fa6fc9

    • SSDEEP

      3072:eR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUur:L25GgFny61mraN

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks