General
-
Target
a494a9258d9191755ed361bcd2ff47f0fba5ae1686d6ef824a0d7f4331d9ec65
-
Size
437KB
-
Sample
240818-gf38wa1fqn
-
MD5
d258d17817131a5cba5041813cda306d
-
SHA1
ae2baa457a2814a12f32bcaea16c6c8dd4460166
-
SHA256
a494a9258d9191755ed361bcd2ff47f0fba5ae1686d6ef824a0d7f4331d9ec65
-
SHA512
69ae2e100a53456a3881e10e723a4ce842a00ad9e601bd3964b1366f0a33d9fbe919a6733808b0413e1e72201226c04196755fe36906cec7da51e7985fbe4f8c
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wc:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSG
Behavioral task
behavioral1
Sample
a494a9258d9191755ed361bcd2ff47f0fba5ae1686d6ef824a0d7f4331d9ec65.dll
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
a494a9258d9191755ed361bcd2ff47f0fba5ae1686d6ef824a0d7f4331d9ec65
-
Size
437KB
-
MD5
d258d17817131a5cba5041813cda306d
-
SHA1
ae2baa457a2814a12f32bcaea16c6c8dd4460166
-
SHA256
a494a9258d9191755ed361bcd2ff47f0fba5ae1686d6ef824a0d7f4331d9ec65
-
SHA512
69ae2e100a53456a3881e10e723a4ce842a00ad9e601bd3964b1366f0a33d9fbe919a6733808b0413e1e72201226c04196755fe36906cec7da51e7985fbe4f8c
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wc:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSG
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-