General
-
Target
0675ae93fa011692f9c20b66b3b59fe0N.exe
-
Size
437KB
-
Sample
240819-rdgbfa1gpp
-
MD5
0675ae93fa011692f9c20b66b3b59fe0
-
SHA1
15890b83ae9e11e1426f8370c8d314f73ddaffb5
-
SHA256
a1e6e5551d68e92f3d3a45b1ec72981103a7548464d9875eda1f08f411cf9031
-
SHA512
1c0ba2fef056bff1f9e0eb376095c4f5cdaa4a4a1ecc00e23b3e4c39788b73273e8fe763665c09bdd66ff025df2451130fac900b2926c4c1f15e413267352c65
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wo:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSy
Behavioral task
behavioral1
Sample
0675ae93fa011692f9c20b66b3b59fe0N.dll
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
0675ae93fa011692f9c20b66b3b59fe0N.exe
-
Size
437KB
-
MD5
0675ae93fa011692f9c20b66b3b59fe0
-
SHA1
15890b83ae9e11e1426f8370c8d314f73ddaffb5
-
SHA256
a1e6e5551d68e92f3d3a45b1ec72981103a7548464d9875eda1f08f411cf9031
-
SHA512
1c0ba2fef056bff1f9e0eb376095c4f5cdaa4a4a1ecc00e23b3e4c39788b73273e8fe763665c09bdd66ff025df2451130fac900b2926c4c1f15e413267352c65
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wo:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSy
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-