General
-
Target
ca9a7474a09cf82d93b13b8d0cebc5e3537d853a20792b992af8ea48146bc32a
-
Size
437KB
-
Sample
240911-2v6yjaxfjq
-
MD5
30c79691b629d4d59ca62c5c82f00903
-
SHA1
c7f8ab8e9019bd2d4c82b15576c6773135f5400f
-
SHA256
ca9a7474a09cf82d93b13b8d0cebc5e3537d853a20792b992af8ea48146bc32a
-
SHA512
e9fc6d48f6d977527502b7b7ee09e0ac4497f87aa6cee58760f3ee3b43743cbabbe739299464979192a1fa5b490325eee062a8927059af95e9d60ab8bfc7096f
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wx:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSr
Behavioral task
behavioral1
Sample
ca9a7474a09cf82d93b13b8d0cebc5e3537d853a20792b992af8ea48146bc32a.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
ca9a7474a09cf82d93b13b8d0cebc5e3537d853a20792b992af8ea48146bc32a
-
Size
437KB
-
MD5
30c79691b629d4d59ca62c5c82f00903
-
SHA1
c7f8ab8e9019bd2d4c82b15576c6773135f5400f
-
SHA256
ca9a7474a09cf82d93b13b8d0cebc5e3537d853a20792b992af8ea48146bc32a
-
SHA512
e9fc6d48f6d977527502b7b7ee09e0ac4497f87aa6cee58760f3ee3b43743cbabbe739299464979192a1fa5b490325eee062a8927059af95e9d60ab8bfc7096f
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wx:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSr
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-