General
-
Target
969287063556481929a300da954ecbf79233640a8d81ddc4535bc0cff0832a50
-
Size
137KB
-
Sample
250302-cw118s1py4
-
MD5
2a064f5f0a85de2ab65e8810099b1964
-
SHA1
9dffbf55d4c79eb9165b9a75a1ef8249f9cc1f33
-
SHA256
969287063556481929a300da954ecbf79233640a8d81ddc4535bc0cff0832a50
-
SHA512
85519a1121820538d7383a14c1d165a1a2dd360fe99c7a14254b68b654de8cef60e0636bc4883be9037be2920d0955a3370f10735806cff0a5c8ae2b9bca4d40
-
SSDEEP
3072:zR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu3:e25GgFny61mraB
Static task
static1
Behavioral task
behavioral1
Sample
969287063556481929a300da954ecbf79233640a8d81ddc4535bc0cff0832a50.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
969287063556481929a300da954ecbf79233640a8d81ddc4535bc0cff0832a50.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
969287063556481929a300da954ecbf79233640a8d81ddc4535bc0cff0832a50
-
Size
137KB
-
MD5
2a064f5f0a85de2ab65e8810099b1964
-
SHA1
9dffbf55d4c79eb9165b9a75a1ef8249f9cc1f33
-
SHA256
969287063556481929a300da954ecbf79233640a8d81ddc4535bc0cff0832a50
-
SHA512
85519a1121820538d7383a14c1d165a1a2dd360fe99c7a14254b68b654de8cef60e0636bc4883be9037be2920d0955a3370f10735806cff0a5c8ae2b9bca4d40
-
SSDEEP
3072:zR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu3:e25GgFny61mraB
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1