General
-
Target
4671eb6846247753f89feeec33512129313c942a0fb44d0b03d18b32d19869e2N.exe
-
Size
437KB
-
Sample
240925-f6y66s1amb
-
MD5
1c9ea3c5b5f04beadca7c29f84eb1930
-
SHA1
0f6f2ff18d13894f42bb4fac43a07c8e4595a99f
-
SHA256
4671eb6846247753f89feeec33512129313c942a0fb44d0b03d18b32d19869e2
-
SHA512
7acf4c620535490a095c73d19c5459754b3e2c817e265e0ede1fba3db124972bea9e3d0470aeed431352b027d7310c936196cc50ccc9f41cd8d774028f2b4228
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wc:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSG
Behavioral task
behavioral1
Sample
4671eb6846247753f89feeec33512129313c942a0fb44d0b03d18b32d19869e2N.dll
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
4671eb6846247753f89feeec33512129313c942a0fb44d0b03d18b32d19869e2N.exe
-
Size
437KB
-
MD5
1c9ea3c5b5f04beadca7c29f84eb1930
-
SHA1
0f6f2ff18d13894f42bb4fac43a07c8e4595a99f
-
SHA256
4671eb6846247753f89feeec33512129313c942a0fb44d0b03d18b32d19869e2
-
SHA512
7acf4c620535490a095c73d19c5459754b3e2c817e265e0ede1fba3db124972bea9e3d0470aeed431352b027d7310c936196cc50ccc9f41cd8d774028f2b4228
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wc:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSG
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-