General

  • Target

    835b421866056272b99e15e2f49f70c4977a64a14422402be11b53563cfbdf57

  • Size

    137KB

  • Sample

    250310-cyhbxazlv5

  • MD5

    615e78ad60aed20a9dc2aafa072ebfa0

  • SHA1

    c48ea5980fdf5b4e3db4cb2754ef14294d43b2a3

  • SHA256

    835b421866056272b99e15e2f49f70c4977a64a14422402be11b53563cfbdf57

  • SHA512

    e6bdf968a2cf2599c6be9c978873dd0bf6d1a8a944a3ec1c16b8e10eb37d8a443f199ee6cbf335dc76be3ed6e4e856fb28d64a5588c2e749e9995b4691939dd4

  • SSDEEP

    3072:NR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuu:A25GgFny61mra0

Malware Config

Targets

    • Target

      835b421866056272b99e15e2f49f70c4977a64a14422402be11b53563cfbdf57

    • Size

      137KB

    • MD5

      615e78ad60aed20a9dc2aafa072ebfa0

    • SHA1

      c48ea5980fdf5b4e3db4cb2754ef14294d43b2a3

    • SHA256

      835b421866056272b99e15e2f49f70c4977a64a14422402be11b53563cfbdf57

    • SHA512

      e6bdf968a2cf2599c6be9c978873dd0bf6d1a8a944a3ec1c16b8e10eb37d8a443f199ee6cbf335dc76be3ed6e4e856fb28d64a5588c2e749e9995b4691939dd4

    • SSDEEP

      3072:NR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuu:A25GgFny61mra0

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks