General
-
Target
a83f57c8ea94b475bec2be5f5ac04496be61231d29eced2b77e1c7a5e1215857
-
Size
437KB
-
Sample
240815-kqlncsyhql
-
MD5
13343a059adf8e21074bc04690cd445c
-
SHA1
c175c7ec016e9246565e9c1e92bae42ebcc859f3
-
SHA256
a83f57c8ea94b475bec2be5f5ac04496be61231d29eced2b77e1c7a5e1215857
-
SHA512
fa94c9e4908bbf913bcce1088a789ea3e43c95d68f6e481c3ca0bf1f4de77c7443703ce76fe8ec884bdf86346399f8fa8d0e5b4471062f32cb52194b35670dad
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6W+:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSk
Behavioral task
behavioral1
Sample
a83f57c8ea94b475bec2be5f5ac04496be61231d29eced2b77e1c7a5e1215857.dll
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
a83f57c8ea94b475bec2be5f5ac04496be61231d29eced2b77e1c7a5e1215857
-
Size
437KB
-
MD5
13343a059adf8e21074bc04690cd445c
-
SHA1
c175c7ec016e9246565e9c1e92bae42ebcc859f3
-
SHA256
a83f57c8ea94b475bec2be5f5ac04496be61231d29eced2b77e1c7a5e1215857
-
SHA512
fa94c9e4908bbf913bcce1088a789ea3e43c95d68f6e481c3ca0bf1f4de77c7443703ce76fe8ec884bdf86346399f8fa8d0e5b4471062f32cb52194b35670dad
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6W+:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSk
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-