General

  • Target

    200d2eec36e507ccb6eea32d11e16b3ae74f0c9993fa7ad95f1d088408351422

  • Size

    137KB

  • Sample

    250310-zk2vqaytdz

  • MD5

    66c47eaa63f2249c8428c089e4b09258

  • SHA1

    fc59258099cbdaed479f7bb4e93a8377c542ad30

  • SHA256

    200d2eec36e507ccb6eea32d11e16b3ae74f0c9993fa7ad95f1d088408351422

  • SHA512

    41a5a41be7fe9d5e535ce5f524c126ca5beafd3621c37d38599250a197d9e990a69f1ff9b7b91235b5aa8aa84e280c94fb3a5458292cbde927dec8cf83b42cc9

  • SSDEEP

    3072:JR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuC:E25GgFny61mra4

Malware Config

Targets

    • Target

      200d2eec36e507ccb6eea32d11e16b3ae74f0c9993fa7ad95f1d088408351422

    • Size

      137KB

    • MD5

      66c47eaa63f2249c8428c089e4b09258

    • SHA1

      fc59258099cbdaed479f7bb4e93a8377c542ad30

    • SHA256

      200d2eec36e507ccb6eea32d11e16b3ae74f0c9993fa7ad95f1d088408351422

    • SHA512

      41a5a41be7fe9d5e535ce5f524c126ca5beafd3621c37d38599250a197d9e990a69f1ff9b7b91235b5aa8aa84e280c94fb3a5458292cbde927dec8cf83b42cc9

    • SSDEEP

      3072:JR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuC:E25GgFny61mra4

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Port Monitors

      Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks