General
-
Target
deb537f731d2d316a688b0b47a6019772d1f2720e00bf3cf3c830eb2130e0046
-
Size
137KB
-
Sample
231012-xcnl1sgd21
-
MD5
cc2d3beeac14ed23a22322d10421698a
-
SHA1
cd6e92f037f2953adcc0c15e6e6a63e025ad118f
-
SHA256
deb537f731d2d316a688b0b47a6019772d1f2720e00bf3cf3c830eb2130e0046
-
SHA512
1658b74eca7e151a4cefc001723f3ac27579445a04346344ac4fc785df5ea1a93c9c98d349015ac3728561477fc93f90dc0c902c425e3a9134dc87dc10d6c68d
-
SSDEEP
3072:kUDBHy4BBy6eFJrmmIewRxM5JSQcqj3G/EAeq:k0yB6oJrcRWQ/qj2EL
Behavioral task
behavioral1
Sample
deb537f731d2d316a688b0b47a6019772d1f2720e00bf3cf3c830eb2130e0046.dll
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
deb537f731d2d316a688b0b47a6019772d1f2720e00bf3cf3c830eb2130e0046
-
Size
137KB
-
MD5
cc2d3beeac14ed23a22322d10421698a
-
SHA1
cd6e92f037f2953adcc0c15e6e6a63e025ad118f
-
SHA256
deb537f731d2d316a688b0b47a6019772d1f2720e00bf3cf3c830eb2130e0046
-
SHA512
1658b74eca7e151a4cefc001723f3ac27579445a04346344ac4fc785df5ea1a93c9c98d349015ac3728561477fc93f90dc0c902c425e3a9134dc87dc10d6c68d
-
SSDEEP
3072:kUDBHy4BBy6eFJrmmIewRxM5JSQcqj3G/EAeq:k0yB6oJrcRWQ/qj2EL
-
Gh0st RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Suspicious use of SetThreadContext
-