General
-
Target
c2ac9ae7e4a3f2735566da759928234270794280ee5e98f0f3d935441ae06c39
-
Size
437KB
-
Sample
240818-gd8qks1erl
-
MD5
b624fb562137191ec7ce772da120c4d4
-
SHA1
86ddebefc66914d399f5c5d99188c64d90ee380f
-
SHA256
c2ac9ae7e4a3f2735566da759928234270794280ee5e98f0f3d935441ae06c39
-
SHA512
35c297b1952139d4262e82ab8f2e4361fcdc6cacb557d4e4a38fa382dac5320ae8a0cf5acdb41deed3e433bd0735a4462f46b6148583042e4174a639f37784cc
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6WH:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSd
Behavioral task
behavioral1
Sample
c2ac9ae7e4a3f2735566da759928234270794280ee5e98f0f3d935441ae06c39.dll
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
c2ac9ae7e4a3f2735566da759928234270794280ee5e98f0f3d935441ae06c39
-
Size
437KB
-
MD5
b624fb562137191ec7ce772da120c4d4
-
SHA1
86ddebefc66914d399f5c5d99188c64d90ee380f
-
SHA256
c2ac9ae7e4a3f2735566da759928234270794280ee5e98f0f3d935441ae06c39
-
SHA512
35c297b1952139d4262e82ab8f2e4361fcdc6cacb557d4e4a38fa382dac5320ae8a0cf5acdb41deed3e433bd0735a4462f46b6148583042e4174a639f37784cc
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6WH:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSd
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-