General
-
Target
b56af3a42212e4a8484b04b6c1b54a3cf05501b5f731292d2f8180d21de809ba
-
Size
437KB
-
Sample
240925-e9xl3sydrf
-
MD5
14bfd361df1898489ea9dd8d0f4bb41f
-
SHA1
465640b698452e2829c1f0d0405bc4b2f6e31e30
-
SHA256
b56af3a42212e4a8484b04b6c1b54a3cf05501b5f731292d2f8180d21de809ba
-
SHA512
a00d8a72cac15a0efd8d72989391e5c26feb14bb1a66a22438adc4a8b246d5ea80f054a7262ce98d0ddb47a7fb6307392d5e5a3008a392fb1f1a83797bf9245e
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wb:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSB
Behavioral task
behavioral1
Sample
b56af3a42212e4a8484b04b6c1b54a3cf05501b5f731292d2f8180d21de809ba.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
b56af3a42212e4a8484b04b6c1b54a3cf05501b5f731292d2f8180d21de809ba
-
Size
437KB
-
MD5
14bfd361df1898489ea9dd8d0f4bb41f
-
SHA1
465640b698452e2829c1f0d0405bc4b2f6e31e30
-
SHA256
b56af3a42212e4a8484b04b6c1b54a3cf05501b5f731292d2f8180d21de809ba
-
SHA512
a00d8a72cac15a0efd8d72989391e5c26feb14bb1a66a22438adc4a8b246d5ea80f054a7262ce98d0ddb47a7fb6307392d5e5a3008a392fb1f1a83797bf9245e
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wb:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSB
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-