General
-
Target
b70d00ab21608ef1f9faeeeb87e1ec9829d901fdfa65ec660c04a8fa9f3c8782
-
Size
437KB
-
Sample
240815-kqly5avanc
-
MD5
837b6ac0256427aadbf8a25dc6a4a481
-
SHA1
c5db8ad42729842e6775754ee1284b531f446f0b
-
SHA256
b70d00ab21608ef1f9faeeeb87e1ec9829d901fdfa65ec660c04a8fa9f3c8782
-
SHA512
3cd0613576f9288168df7c21d0b5fbc481c07cdb927be997768861f4b6a29ba1e03a35b612c9c988a0b7ab4a69448ded4d2153609dbc429db694e4061d617820
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6WK:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSQ
Behavioral task
behavioral1
Sample
b70d00ab21608ef1f9faeeeb87e1ec9829d901fdfa65ec660c04a8fa9f3c8782.dll
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
b70d00ab21608ef1f9faeeeb87e1ec9829d901fdfa65ec660c04a8fa9f3c8782
-
Size
437KB
-
MD5
837b6ac0256427aadbf8a25dc6a4a481
-
SHA1
c5db8ad42729842e6775754ee1284b531f446f0b
-
SHA256
b70d00ab21608ef1f9faeeeb87e1ec9829d901fdfa65ec660c04a8fa9f3c8782
-
SHA512
3cd0613576f9288168df7c21d0b5fbc481c07cdb927be997768861f4b6a29ba1e03a35b612c9c988a0b7ab4a69448ded4d2153609dbc429db694e4061d617820
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6WK:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSQ
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-