General
-
Target
dd35bca4c87ccd91a41ed56c4368cd40N
-
Size
137KB
-
Sample
240912-q7c1faxdjl
-
MD5
dd35bca4c87ccd91a41ed56c4368cd40
-
SHA1
6d0ee86b23a7563d35a8cf05895b82d9cfd55a26
-
SHA256
f59b3f463fae5e7c25afab2033f1094e43e575bc6d28ce3534efcf4a66d06b92
-
SHA512
969abc5d1525046756fd0afb13a32dd97a1c114bbd8282a35579113a5fa12df797325910a9b8778ed00e602bc5bd72463408214f8415daa2820b2399664a4ddb
-
SSDEEP
3072:0R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuH:x25GgFny61mrah
Static task
static1
Behavioral task
behavioral1
Sample
dd35bca4c87ccd91a41ed56c4368cd40N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd35bca4c87ccd91a41ed56c4368cd40N.dll
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
dd35bca4c87ccd91a41ed56c4368cd40N
-
Size
137KB
-
MD5
dd35bca4c87ccd91a41ed56c4368cd40
-
SHA1
6d0ee86b23a7563d35a8cf05895b82d9cfd55a26
-
SHA256
f59b3f463fae5e7c25afab2033f1094e43e575bc6d28ce3534efcf4a66d06b92
-
SHA512
969abc5d1525046756fd0afb13a32dd97a1c114bbd8282a35579113a5fa12df797325910a9b8778ed00e602bc5bd72463408214f8415daa2820b2399664a4ddb
-
SSDEEP
3072:0R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuH:x25GgFny61mrah
Score10/10-
Gh0st RAT payload
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1