General
-
Target
6f92ee97f05af80c70afbce1359c36b6a2db738b242616443e35cd9c9140a970
-
Size
437KB
-
Sample
240818-gf9ewsyene
-
MD5
2bc255b040e67a0754a318caee1be176
-
SHA1
685f7b81aaeed66316d6ade03ffde2a57a5c3ea3
-
SHA256
6f92ee97f05af80c70afbce1359c36b6a2db738b242616443e35cd9c9140a970
-
SHA512
7cc125c1d19bfc95cfe51665a2313beb76b728c885bef598c8299688f51213f01a9c164293795c4611980a99ebec15237cf56fbaa170da538092fae744048e7e
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6WN:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSX
Behavioral task
behavioral1
Sample
6f92ee97f05af80c70afbce1359c36b6a2db738b242616443e35cd9c9140a970.dll
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
6f92ee97f05af80c70afbce1359c36b6a2db738b242616443e35cd9c9140a970
-
Size
437KB
-
MD5
2bc255b040e67a0754a318caee1be176
-
SHA1
685f7b81aaeed66316d6ade03ffde2a57a5c3ea3
-
SHA256
6f92ee97f05af80c70afbce1359c36b6a2db738b242616443e35cd9c9140a970
-
SHA512
7cc125c1d19bfc95cfe51665a2313beb76b728c885bef598c8299688f51213f01a9c164293795c4611980a99ebec15237cf56fbaa170da538092fae744048e7e
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6WN:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSX
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-