General
-
Target
7345cc802333d97b12d27c897ee998136e469de7412a2e93ef8dad282fac278f.exe
-
Size
163KB
-
Sample
241125-d8832ssmem
-
MD5
ac39392fe4064c32edb92de807023544
-
SHA1
d53e5d8a41f40e0e15257e337a45db351afcd6d7
-
SHA256
7345cc802333d97b12d27c897ee998136e469de7412a2e93ef8dad282fac278f
-
SHA512
eedd9bd918a774a99b6eb2c0bfa327e70e5a7491aa504159f871fcc714eb2d0030a216c446738ca05a8907d6c42414d6789c44f03370bb57a599bead794933ef
-
SSDEEP
3072:x5VK0lTSG9xoC+CQpiU5MvUOGk//qmwYre9BN0N4wk:E0T9xB+CU4Gk//vwYre9BmNc
Behavioral task
behavioral1
Sample
7345cc802333d97b12d27c897ee998136e469de7412a2e93ef8dad282fac278f.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7345cc802333d97b12d27c897ee998136e469de7412a2e93ef8dad282fac278f.dll
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
7345cc802333d97b12d27c897ee998136e469de7412a2e93ef8dad282fac278f.exe
-
Size
163KB
-
MD5
ac39392fe4064c32edb92de807023544
-
SHA1
d53e5d8a41f40e0e15257e337a45db351afcd6d7
-
SHA256
7345cc802333d97b12d27c897ee998136e469de7412a2e93ef8dad282fac278f
-
SHA512
eedd9bd918a774a99b6eb2c0bfa327e70e5a7491aa504159f871fcc714eb2d0030a216c446738ca05a8907d6c42414d6789c44f03370bb57a599bead794933ef
-
SSDEEP
3072:x5VK0lTSG9xoC+CQpiU5MvUOGk//qmwYre9BN0N4wk:E0T9xB+CU4Gk//vwYre9BmNc
-
Blackmoon family
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Gh0strat family
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Server Software Component: Terminal Services DLL
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1