Overview
overview
10Static
static
101106-01-Redline.exe
windows10-1703-x64
101106-01-Redline.exe
windows10-2004-x64
101106-02-Stealc.exe
windows10-1703-x64
101106-02-Stealc.exe
windows10-2004-x64
101106-03-Ag...la.exe
windows10-1703-x64
101106-03-Ag...la.exe
windows10-2004-x64
101106-04-Warzone.exe
windows10-1703-x64
101106-04-Warzone.exe
windows10-2004-x64
101106-05-Windigo.exe
windows10-1703-x64
71106-05-Windigo.exe
windows10-2004-x64
71106-06-Zgrat.exe
windows10-1703-x64
101106-06-Zgrat.exe
windows10-2004-x64
101106-07-Bl...er.exe
windows10-1703-x64
101106-07-Bl...er.exe
windows10-2004-x64
71106-08-Glupteba.exe
windows10-1703-x64
101106-08-Glupteba.exe
windows10-2004-x64
101106-09-Msfvenom.exe
windows10-1703-x64
101106-09-Msfvenom.exe
windows10-2004-x64
101106-10-Windigo.exe
windows10-1703-x64
71106-10-Windigo.exe
windows10-2004-x64
71106-11-Njrat.exe
windows10-1703-x64
101106-11-Njrat.exe
windows10-2004-x64
101106-12-Gh0st.dll
windows10-1703-x64
11106-12-Gh0st.dll
windows10-2004-x64
1Resubmissions
06-11-2023 19:37
231106-ybwfxadf81 1006-11-2023 19:33
231106-x9tjjadf4z 1006-11-2023 16:18
231106-tr58tscc9y 10Analysis
-
max time kernel
670s -
max time network
1153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2023 19:37
Behavioral task
behavioral1
Sample
1106-01-Redline.exe
Resource
win10-20231025-en
Behavioral task
behavioral2
Sample
1106-01-Redline.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
1106-02-Stealc.exe
Resource
win10-20231023-en
Behavioral task
behavioral4
Sample
1106-02-Stealc.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
1106-03-AgentTesla.exe
Resource
win10-20231020-en
Behavioral task
behavioral6
Sample
1106-03-AgentTesla.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
1106-04-Warzone.exe
Resource
win10-20231020-en
Behavioral task
behavioral8
Sample
1106-04-Warzone.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral9
Sample
1106-05-Windigo.exe
Resource
win10-20231023-en
Behavioral task
behavioral10
Sample
1106-05-Windigo.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
1106-06-Zgrat.exe
Resource
win10-20231020-en
Behavioral task
behavioral12
Sample
1106-06-Zgrat.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
1106-07-BlankGrabber.exe
Resource
win10-20231025-en
Behavioral task
behavioral14
Sample
1106-07-BlankGrabber.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral15
Sample
1106-08-Glupteba.exe
Resource
win10-20231020-en
Behavioral task
behavioral16
Sample
1106-08-Glupteba.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
1106-09-Msfvenom.exe
Resource
win10-20231023-en
Behavioral task
behavioral18
Sample
1106-09-Msfvenom.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
1106-10-Windigo.exe
Resource
win10-20231020-en
Behavioral task
behavioral20
Sample
1106-10-Windigo.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
1106-11-Njrat.exe
Resource
win10-20231025-en
Behavioral task
behavioral22
Sample
1106-11-Njrat.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral23
Sample
1106-12-Gh0st.dll
Resource
win10-20231023-en
Behavioral task
behavioral24
Sample
1106-12-Gh0st.dll
Resource
win10v2004-20231020-en
General
-
Target
1106-12-Gh0st.dll
-
Size
51KB
-
MD5
ab865d38d71c556abf1540dc7b60976c
-
SHA1
0bd5aa27ca3f2e0e071746854c793cf27931595e
-
SHA256
35c37a88b8a9076e7bd6f793719650e25cccffa121ee547f807239cc7b8fca72
-
SHA512
589e063e73f17a375f33ae3785673a09ad67d3e5594f99b81a8097608c5cf8a88799e26a36ad619bc14d137ff0171549a65b1d89d104b0bd65476a5bd1c51e93
-
SSDEEP
1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoLbJYH5:1dWubF3n9S91BF3fbo3JYH5
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4236 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1948 wrote to memory of 4236 1948 rundll32.exe 86 PID 1948 wrote to memory of 4236 1948 rundll32.exe 86 PID 1948 wrote to memory of 4236 1948 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1106-12-Gh0st.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1106-12-Gh0st.dll,#12⤵
- Suspicious behavior: RenamesItself
PID:4236
-