General
-
Target
b7b27bb86a167784e1b3b63ecc9402cfc6861bb913f18125b65bb0d9e0d5cab4
-
Size
437KB
-
Sample
240911-hyb3sayaqk
-
MD5
9d080dee1132246ce6c974eaa14f3adf
-
SHA1
4ddfb415820fdf1725e9ab7d46965ec9c80d7345
-
SHA256
b7b27bb86a167784e1b3b63ecc9402cfc6861bb913f18125b65bb0d9e0d5cab4
-
SHA512
be2de09862e9a4f83bb746fd616e20d22a2004fecc56b81e5e9fd01d32c4ea777c55695f82633ac532d9a43408813c8c9276bf6135c73bee55864ae47bc874a0
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wi:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoS4
Behavioral task
behavioral1
Sample
b7b27bb86a167784e1b3b63ecc9402cfc6861bb913f18125b65bb0d9e0d5cab4.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
b7b27bb86a167784e1b3b63ecc9402cfc6861bb913f18125b65bb0d9e0d5cab4
-
Size
437KB
-
MD5
9d080dee1132246ce6c974eaa14f3adf
-
SHA1
4ddfb415820fdf1725e9ab7d46965ec9c80d7345
-
SHA256
b7b27bb86a167784e1b3b63ecc9402cfc6861bb913f18125b65bb0d9e0d5cab4
-
SHA512
be2de09862e9a4f83bb746fd616e20d22a2004fecc56b81e5e9fd01d32c4ea777c55695f82633ac532d9a43408813c8c9276bf6135c73bee55864ae47bc874a0
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wi:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoS4
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-