General
-
Target
ab4ff6e02f219cad766bda60c54ae6cba1c857726715337eeb29e70002646503
-
Size
137KB
-
Sample
250128-cb55fstnck
-
MD5
2ff8aee30f8d64b1e4366e87f28e21c2
-
SHA1
d8afcddb3c9a8d52b0ae329525098d9b27509c88
-
SHA256
ab4ff6e02f219cad766bda60c54ae6cba1c857726715337eeb29e70002646503
-
SHA512
80935599413e6251517c9f3e0c747cbe8f12c0a43cdbe3967235efeb88eed390ab62f2d31df2f521402614614a1b4703f00f2d85184ea1f337e902b32991b73c
-
SSDEEP
3072:1R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuI:Y25GgFny61mraC
Static task
static1
Behavioral task
behavioral1
Sample
ab4ff6e02f219cad766bda60c54ae6cba1c857726715337eeb29e70002646503.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ab4ff6e02f219cad766bda60c54ae6cba1c857726715337eeb29e70002646503.dll
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ab4ff6e02f219cad766bda60c54ae6cba1c857726715337eeb29e70002646503
-
Size
137KB
-
MD5
2ff8aee30f8d64b1e4366e87f28e21c2
-
SHA1
d8afcddb3c9a8d52b0ae329525098d9b27509c88
-
SHA256
ab4ff6e02f219cad766bda60c54ae6cba1c857726715337eeb29e70002646503
-
SHA512
80935599413e6251517c9f3e0c747cbe8f12c0a43cdbe3967235efeb88eed390ab62f2d31df2f521402614614a1b4703f00f2d85184ea1f337e902b32991b73c
-
SSDEEP
3072:1R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuI:Y25GgFny61mraC
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1