General
-
Target
0c88b5a7972c119b03ac973ddab65f6147a8dad4aedcb635a1654220df7695f5
-
Size
137KB
-
Sample
250301-ygc7hszwg1
-
MD5
9838a347cf10c6fbd2bce0e34b371c31
-
SHA1
d5d600b432428b4bfa5fe92bc0ee77868e8b28ca
-
SHA256
0c88b5a7972c119b03ac973ddab65f6147a8dad4aedcb635a1654220df7695f5
-
SHA512
3f1e969862e478f64b97407bb39c6e5f507af5bcbd26f5f784b03ef9b0400d928a86f0c80d1cf5da26c83d43e0bf7e0fbf09a5745532812d707bf7ca1d38f78c
-
SSDEEP
3072:fR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuh:i25GgFny61mraj
Static task
static1
Behavioral task
behavioral1
Sample
0c88b5a7972c119b03ac973ddab65f6147a8dad4aedcb635a1654220df7695f5.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c88b5a7972c119b03ac973ddab65f6147a8dad4aedcb635a1654220df7695f5.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
0c88b5a7972c119b03ac973ddab65f6147a8dad4aedcb635a1654220df7695f5
-
Size
137KB
-
MD5
9838a347cf10c6fbd2bce0e34b371c31
-
SHA1
d5d600b432428b4bfa5fe92bc0ee77868e8b28ca
-
SHA256
0c88b5a7972c119b03ac973ddab65f6147a8dad4aedcb635a1654220df7695f5
-
SHA512
3f1e969862e478f64b97407bb39c6e5f507af5bcbd26f5f784b03ef9b0400d928a86f0c80d1cf5da26c83d43e0bf7e0fbf09a5745532812d707bf7ca1d38f78c
-
SSDEEP
3072:fR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuh:i25GgFny61mraj
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1