General
-
Target
587edbecab7fa9a323dd334513b3fca41934823cdc5bc1456ce473b0fcbfeb41
-
Size
437KB
-
Sample
241002-gtcm3s1blj
-
MD5
ff7f4655d070b8bae1d1c3f4267ee6de
-
SHA1
0a92ee5bfa44ba3d490a1c27e0cb6ffca45f3202
-
SHA256
587edbecab7fa9a323dd334513b3fca41934823cdc5bc1456ce473b0fcbfeb41
-
SHA512
01d5c659040301bab64d02608f60b6807519ba4fd932362c4624e02d14d2848b85d171b81310d5544537e74a0a41c4c53beb18b317e932e0fad2b4e1d2ab9546
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wq:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSw
Behavioral task
behavioral1
Sample
587edbecab7fa9a323dd334513b3fca41934823cdc5bc1456ce473b0fcbfeb41.dll
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
587edbecab7fa9a323dd334513b3fca41934823cdc5bc1456ce473b0fcbfeb41
-
Size
437KB
-
MD5
ff7f4655d070b8bae1d1c3f4267ee6de
-
SHA1
0a92ee5bfa44ba3d490a1c27e0cb6ffca45f3202
-
SHA256
587edbecab7fa9a323dd334513b3fca41934823cdc5bc1456ce473b0fcbfeb41
-
SHA512
01d5c659040301bab64d02608f60b6807519ba4fd932362c4624e02d14d2848b85d171b81310d5544537e74a0a41c4c53beb18b317e932e0fad2b4e1d2ab9546
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wq:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSw
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-