General
-
Target
767cc0a526a752424af4cb167d9c94faeaf3eebebbd04e11c1f7fd8ed5a903bf
-
Size
137KB
-
Sample
250302-a7yddaymy4
-
MD5
07a5b7c2b0ecb4c0fce3dc1854b19c06
-
SHA1
a5424f674292d9bcf1d6198540e2289f889de042
-
SHA256
767cc0a526a752424af4cb167d9c94faeaf3eebebbd04e11c1f7fd8ed5a903bf
-
SHA512
8919c247ab8fcf05a785b0dcc3b579fb7a7285aa6a2b46c7f2426857632d8f1de593e8e2e50f054adcf78a193fd32367bb41d9e4ae8a0a61adbfd03b67d4faa2
-
SSDEEP
3072:rR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu2:G25GgFny61mraQ
Static task
static1
Behavioral task
behavioral1
Sample
767cc0a526a752424af4cb167d9c94faeaf3eebebbd04e11c1f7fd8ed5a903bf.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
767cc0a526a752424af4cb167d9c94faeaf3eebebbd04e11c1f7fd8ed5a903bf.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
767cc0a526a752424af4cb167d9c94faeaf3eebebbd04e11c1f7fd8ed5a903bf
-
Size
137KB
-
MD5
07a5b7c2b0ecb4c0fce3dc1854b19c06
-
SHA1
a5424f674292d9bcf1d6198540e2289f889de042
-
SHA256
767cc0a526a752424af4cb167d9c94faeaf3eebebbd04e11c1f7fd8ed5a903bf
-
SHA512
8919c247ab8fcf05a785b0dcc3b579fb7a7285aa6a2b46c7f2426857632d8f1de593e8e2e50f054adcf78a193fd32367bb41d9e4ae8a0a61adbfd03b67d4faa2
-
SSDEEP
3072:rR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu2:G25GgFny61mraQ
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-