General
-
Target
21bb8641ca88bbb9e54b3528e3f5bf518cdad2f515cae194461acea283db3e43
-
Size
137KB
-
Sample
240925-x7t3aawgrg
-
MD5
bf36c895824b2e5b946e6075c1f4ff4c
-
SHA1
f366c9ea7bc1ea8db582e0e6693031ab365d33cf
-
SHA256
21bb8641ca88bbb9e54b3528e3f5bf518cdad2f515cae194461acea283db3e43
-
SHA512
8f7950078cf981216621dce05d3ccc5856b7f3d3225f0f94c9e8bae35d9a84634091463de83576948d498f4c1430b0dc04882ca1ec1948f09de66a3e5d6c3ebe
-
SSDEEP
3072:HR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuj:625GgFny61mral
Static task
static1
Behavioral task
behavioral1
Sample
21bb8641ca88bbb9e54b3528e3f5bf518cdad2f515cae194461acea283db3e43.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
21bb8641ca88bbb9e54b3528e3f5bf518cdad2f515cae194461acea283db3e43.dll
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
21bb8641ca88bbb9e54b3528e3f5bf518cdad2f515cae194461acea283db3e43
-
Size
137KB
-
MD5
bf36c895824b2e5b946e6075c1f4ff4c
-
SHA1
f366c9ea7bc1ea8db582e0e6693031ab365d33cf
-
SHA256
21bb8641ca88bbb9e54b3528e3f5bf518cdad2f515cae194461acea283db3e43
-
SHA512
8f7950078cf981216621dce05d3ccc5856b7f3d3225f0f94c9e8bae35d9a84634091463de83576948d498f4c1430b0dc04882ca1ec1948f09de66a3e5d6c3ebe
-
SSDEEP
3072:HR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuj:625GgFny61mral
Score10/10-
Gh0st RAT payload
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1