General
-
Target
7694440c4a9f36249dfa3e9e00472bf22b4665b17108ea1bd6a24a9d663d4533N.exe
-
Size
163KB
-
Sample
241124-ndwjksxjfy
-
MD5
56dea4858f3c7afecd014f2b53026950
-
SHA1
d3ae2b89b7d2ca38beef7a729ae74aed1b0f2ede
-
SHA256
7694440c4a9f36249dfa3e9e00472bf22b4665b17108ea1bd6a24a9d663d4533
-
SHA512
bf69b52ed53bf99e37e84ef4d459a3d485f1277b4b2a58a8c8bb1008ad017e99bf0df5d4c8a7709a4fff639422f63b785a8de2e3bfd54bc848b411732d101519
-
SSDEEP
3072:x5VK0lTSG9xoC+CQpiU5MvUOGk//qmwYre9BN0N4w:E0T9xB+CU4Gk//vwYre9BmN
Behavioral task
behavioral1
Sample
7694440c4a9f36249dfa3e9e00472bf22b4665b17108ea1bd6a24a9d663d4533N.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7694440c4a9f36249dfa3e9e00472bf22b4665b17108ea1bd6a24a9d663d4533N.dll
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7694440c4a9f36249dfa3e9e00472bf22b4665b17108ea1bd6a24a9d663d4533N.exe
-
Size
163KB
-
MD5
56dea4858f3c7afecd014f2b53026950
-
SHA1
d3ae2b89b7d2ca38beef7a729ae74aed1b0f2ede
-
SHA256
7694440c4a9f36249dfa3e9e00472bf22b4665b17108ea1bd6a24a9d663d4533
-
SHA512
bf69b52ed53bf99e37e84ef4d459a3d485f1277b4b2a58a8c8bb1008ad017e99bf0df5d4c8a7709a4fff639422f63b785a8de2e3bfd54bc848b411732d101519
-
SSDEEP
3072:x5VK0lTSG9xoC+CQpiU5MvUOGk//qmwYre9BN0N4w:E0T9xB+CU4Gk//vwYre9BmN
-
Blackmoon family
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Gh0strat family
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Server Software Component: Terminal Services DLL
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1