General
-
Target
f207eecea8f248434744966cf6221ce8669a62945fc6da69eed9d8885bc9cd37
-
Size
437KB
-
Sample
240923-jxazrszdrn
-
MD5
0ed2acffb97260cb0e595d38e9946507
-
SHA1
8920348471b618274bf6f4fb43b4ef17787076f8
-
SHA256
f207eecea8f248434744966cf6221ce8669a62945fc6da69eed9d8885bc9cd37
-
SHA512
b90d908bf5d43a4d15d89666e7ffcc5363a49be40f0e3513fbaa80325fe0fcd744ae23767199fd72a8f1e046c59d84c23590cb29e0928250f83695ddc9746362
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6W0:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSu
Behavioral task
behavioral1
Sample
f207eecea8f248434744966cf6221ce8669a62945fc6da69eed9d8885bc9cd37.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
f207eecea8f248434744966cf6221ce8669a62945fc6da69eed9d8885bc9cd37
-
Size
437KB
-
MD5
0ed2acffb97260cb0e595d38e9946507
-
SHA1
8920348471b618274bf6f4fb43b4ef17787076f8
-
SHA256
f207eecea8f248434744966cf6221ce8669a62945fc6da69eed9d8885bc9cd37
-
SHA512
b90d908bf5d43a4d15d89666e7ffcc5363a49be40f0e3513fbaa80325fe0fcd744ae23767199fd72a8f1e046c59d84c23590cb29e0928250f83695ddc9746362
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6W0:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSu
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-