General
-
Target
f7606e33d9c6bf6dac69d8d2a28cbfd4f1e21ab6a2e34568aee045d59ddee3b7
-
Size
437KB
-
Sample
240910-mqb52azbrk
-
MD5
ac5d2dae6ba346f2b8271ef7b89dd1cd
-
SHA1
20d1b11b150a6b849eddb8e126a1f64a04d82f2e
-
SHA256
f7606e33d9c6bf6dac69d8d2a28cbfd4f1e21ab6a2e34568aee045d59ddee3b7
-
SHA512
ebff6988ecd56e02cd241bf84215b32a218039085034c189381579a62710f450209037dce3dbeb79dc88e525e828a0e029cede1b9f73a431a3ad1b68173c2484
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wc:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSG
Behavioral task
behavioral1
Sample
f7606e33d9c6bf6dac69d8d2a28cbfd4f1e21ab6a2e34568aee045d59ddee3b7.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
f7606e33d9c6bf6dac69d8d2a28cbfd4f1e21ab6a2e34568aee045d59ddee3b7
-
Size
437KB
-
MD5
ac5d2dae6ba346f2b8271ef7b89dd1cd
-
SHA1
20d1b11b150a6b849eddb8e126a1f64a04d82f2e
-
SHA256
f7606e33d9c6bf6dac69d8d2a28cbfd4f1e21ab6a2e34568aee045d59ddee3b7
-
SHA512
ebff6988ecd56e02cd241bf84215b32a218039085034c189381579a62710f450209037dce3dbeb79dc88e525e828a0e029cede1b9f73a431a3ad1b68173c2484
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wc:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSG
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-