General

  • Target

    2c9a6ebd979a7c3be5c71461ead614ea7b51274fea41abb1a10d4c939384d16f

  • Size

    137KB

  • Sample

    250310-z826dsypv4

  • MD5

    326ecfc52c26ccd5814b641e742182b9

  • SHA1

    83c0a60bcbe0f365df1a2a2435c9d43b6b57ee4d

  • SHA256

    2c9a6ebd979a7c3be5c71461ead614ea7b51274fea41abb1a10d4c939384d16f

  • SHA512

    138a366e8e2693b97f1ea54a6c7a57db668e75f6adb3b93eb600562721117ed8b621f1e0886234de89070fe3f9e2cc45b6646d9bc84cfcb67a9a6f302a0350c0

  • SSDEEP

    3072:mR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuS:D25GgFny61mraA

Malware Config

Targets

    • Target

      2c9a6ebd979a7c3be5c71461ead614ea7b51274fea41abb1a10d4c939384d16f

    • Size

      137KB

    • MD5

      326ecfc52c26ccd5814b641e742182b9

    • SHA1

      83c0a60bcbe0f365df1a2a2435c9d43b6b57ee4d

    • SHA256

      2c9a6ebd979a7c3be5c71461ead614ea7b51274fea41abb1a10d4c939384d16f

    • SHA512

      138a366e8e2693b97f1ea54a6c7a57db668e75f6adb3b93eb600562721117ed8b621f1e0886234de89070fe3f9e2cc45b6646d9bc84cfcb67a9a6f302a0350c0

    • SSDEEP

      3072:mR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuS:D25GgFny61mraA

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks