General
-
Target
9294227e59c84368fef788cb6938b13a2c458d33d3b721da29014b4c8f58e67e.exe
-
Size
137KB
-
Sample
250127-ckct9svpg1
-
MD5
42836fabd61e79fa1d1ed2de330083b0
-
SHA1
ec2e6e89ce7aa16fcf292a8e9f8e23eb69e36081
-
SHA256
9294227e59c84368fef788cb6938b13a2c458d33d3b721da29014b4c8f58e67e
-
SHA512
5b411225db98f138ed63230dd8379ee9e4ea8ede542bbcf576d7efaed7bb02bcdd10608a5482ade862dcca3c4c3a080b8e4d3fe48f77ade1c75790658ab1ca2c
-
SSDEEP
3072:2R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuI:z25GgFny61mraS
Static task
static1
Behavioral task
behavioral1
Sample
9294227e59c84368fef788cb6938b13a2c458d33d3b721da29014b4c8f58e67e.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9294227e59c84368fef788cb6938b13a2c458d33d3b721da29014b4c8f58e67e.dll
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
9294227e59c84368fef788cb6938b13a2c458d33d3b721da29014b4c8f58e67e.exe
-
Size
137KB
-
MD5
42836fabd61e79fa1d1ed2de330083b0
-
SHA1
ec2e6e89ce7aa16fcf292a8e9f8e23eb69e36081
-
SHA256
9294227e59c84368fef788cb6938b13a2c458d33d3b721da29014b4c8f58e67e
-
SHA512
5b411225db98f138ed63230dd8379ee9e4ea8ede542bbcf576d7efaed7bb02bcdd10608a5482ade862dcca3c4c3a080b8e4d3fe48f77ade1c75790658ab1ca2c
-
SSDEEP
3072:2R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuI:z25GgFny61mraS
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1