General
-
Target
d237f83486161574230fd9de77060230N
-
Size
437KB
-
Sample
240909-x3l6wavgnj
-
MD5
d237f83486161574230fd9de77060230
-
SHA1
f0426266005c9677b2b721d5ef35efd4fb5aacf1
-
SHA256
4b06464a9af8e1ec4a5cf10182b3a1f6e18b8c1464634c6f1102ed19489d1305
-
SHA512
316f2848748e7ad4a71ec7b7b1e3e3650106ab778250b7d7784029c60aebdd350d7fcd2f0af2e3517bd1557f0794885713757bb735f8f4ca68b4c34191d47206
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6WS:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSI
Behavioral task
behavioral1
Sample
d237f83486161574230fd9de77060230N.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
d237f83486161574230fd9de77060230N
-
Size
437KB
-
MD5
d237f83486161574230fd9de77060230
-
SHA1
f0426266005c9677b2b721d5ef35efd4fb5aacf1
-
SHA256
4b06464a9af8e1ec4a5cf10182b3a1f6e18b8c1464634c6f1102ed19489d1305
-
SHA512
316f2848748e7ad4a71ec7b7b1e3e3650106ab778250b7d7784029c60aebdd350d7fcd2f0af2e3517bd1557f0794885713757bb735f8f4ca68b4c34191d47206
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6WS:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSI
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-