General
-
Target
090cfb72b72fb2f4e8d5dfb68da909f5003a5745d7f93438685edbac4a982bb5
-
Size
437KB
-
Sample
240915-v6awxavclc
-
MD5
cb7c631a215dcb9631706e647b72881d
-
SHA1
644bd9a8eba7f37067c733dc8d79b595b70dc836
-
SHA256
090cfb72b72fb2f4e8d5dfb68da909f5003a5745d7f93438685edbac4a982bb5
-
SHA512
67b687bb3f70f049ba9a78aa81b815ea7677be1e5e8e2b428434a1af667b58cf1908d0670adb9d9fb5eb35a802d8908407a55d08c61009c22d310a5a048be155
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wg:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoS6
Behavioral task
behavioral1
Sample
090cfb72b72fb2f4e8d5dfb68da909f5003a5745d7f93438685edbac4a982bb5.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
090cfb72b72fb2f4e8d5dfb68da909f5003a5745d7f93438685edbac4a982bb5
-
Size
437KB
-
MD5
cb7c631a215dcb9631706e647b72881d
-
SHA1
644bd9a8eba7f37067c733dc8d79b595b70dc836
-
SHA256
090cfb72b72fb2f4e8d5dfb68da909f5003a5745d7f93438685edbac4a982bb5
-
SHA512
67b687bb3f70f049ba9a78aa81b815ea7677be1e5e8e2b428434a1af667b58cf1908d0670adb9d9fb5eb35a802d8908407a55d08c61009c22d310a5a048be155
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wg:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoS6
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-