General
-
Target
eb2a4fd1d8e4e49eb2f2a6b4ba641081a0b40494c92d2ca92ebdb36fcebee71a
-
Size
437KB
-
Sample
241217-vef9lstqen
-
MD5
7e3bade6f2e7cf4899b1d07f92200558
-
SHA1
1b0b56ba25c4f643012abf6aa6e2fcf7212c3743
-
SHA256
eb2a4fd1d8e4e49eb2f2a6b4ba641081a0b40494c92d2ca92ebdb36fcebee71a
-
SHA512
f6901d232e03ca8c3fbce3db842c666cfe08269b1bd336574fc0afff5d29e4ce3f6a15533c456c9756db0c9228dc75553c4e16230dfa2f2ebccaaec03a567b06
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6WZ:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSD
Behavioral task
behavioral1
Sample
eb2a4fd1d8e4e49eb2f2a6b4ba641081a0b40494c92d2ca92ebdb36fcebee71a.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
eb2a4fd1d8e4e49eb2f2a6b4ba641081a0b40494c92d2ca92ebdb36fcebee71a
-
Size
437KB
-
MD5
7e3bade6f2e7cf4899b1d07f92200558
-
SHA1
1b0b56ba25c4f643012abf6aa6e2fcf7212c3743
-
SHA256
eb2a4fd1d8e4e49eb2f2a6b4ba641081a0b40494c92d2ca92ebdb36fcebee71a
-
SHA512
f6901d232e03ca8c3fbce3db842c666cfe08269b1bd336574fc0afff5d29e4ce3f6a15533c456c9756db0c9228dc75553c4e16230dfa2f2ebccaaec03a567b06
-
SSDEEP
6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6WZ:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSD
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-