General
-
Target
8856a7adf8699ed7a06a0ffb24ec7820N.exe
-
Size
137KB
-
Sample
240802-lmg2faygna
-
MD5
8856a7adf8699ed7a06a0ffb24ec7820
-
SHA1
dfd85459fdb2325a3c48cbe80c466c2d4c509030
-
SHA256
0a089624f2b569f12214081687e1fb9e1a78a9ce8122df119d58f6237be7fac2
-
SHA512
9b898d94b28f4af9168b3e9a7c38357551519b49b02f1fa92855f393870c14c8bf8a2350bc93052e03cc3108b0381187a6fed9046397bbab05c6a7319c38b43a
-
SSDEEP
3072:6R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUun:v25GgFny61mraF
Static task
static1
Behavioral task
behavioral1
Sample
8856a7adf8699ed7a06a0ffb24ec7820N.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8856a7adf8699ed7a06a0ffb24ec7820N.dll
Resource
win10v2004-20240730-en
Malware Config
Targets
-
-
Target
8856a7adf8699ed7a06a0ffb24ec7820N.exe
-
Size
137KB
-
MD5
8856a7adf8699ed7a06a0ffb24ec7820
-
SHA1
dfd85459fdb2325a3c48cbe80c466c2d4c509030
-
SHA256
0a089624f2b569f12214081687e1fb9e1a78a9ce8122df119d58f6237be7fac2
-
SHA512
9b898d94b28f4af9168b3e9a7c38357551519b49b02f1fa92855f393870c14c8bf8a2350bc93052e03cc3108b0381187a6fed9046397bbab05c6a7319c38b43a
-
SSDEEP
3072:6R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUun:v25GgFny61mraF
Score10/10-
Gh0st RAT payload
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1