General

  • Target

    5ae7d20ccdaa8f2455b44d75a2dfb8ca60f8ab6387bcd145117022934137b481

  • Size

    137KB

  • Sample

    250310-3vpvpasqv7

  • MD5

    5f049bdbf6f3e3c71438a949bc02419d

  • SHA1

    fa69bf2ebc393e14d3a09d04b1a7cd4a3a1ed87b

  • SHA256

    5ae7d20ccdaa8f2455b44d75a2dfb8ca60f8ab6387bcd145117022934137b481

  • SHA512

    4657f7e3cc84c30cc6620ca34b7e7a531f9bec003445bfa914876d751c110c58595a89d59227ced8299393626e05139577b961bf59f0a15c3377b6b20f7fde1c

  • SSDEEP

    3072:BR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu3:M25GgFny61mraJ

Malware Config

Targets

    • Target

      5ae7d20ccdaa8f2455b44d75a2dfb8ca60f8ab6387bcd145117022934137b481

    • Size

      137KB

    • MD5

      5f049bdbf6f3e3c71438a949bc02419d

    • SHA1

      fa69bf2ebc393e14d3a09d04b1a7cd4a3a1ed87b

    • SHA256

      5ae7d20ccdaa8f2455b44d75a2dfb8ca60f8ab6387bcd145117022934137b481

    • SHA512

      4657f7e3cc84c30cc6620ca34b7e7a531f9bec003445bfa914876d751c110c58595a89d59227ced8299393626e05139577b961bf59f0a15c3377b6b20f7fde1c

    • SSDEEP

      3072:BR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu3:M25GgFny61mraJ

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks