General
-
Target
054f6b9acce873cbd0267571c8d106897915db251cef4564dc8278a355efd922
-
Size
137KB
-
Sample
250302-xxcegs11e1
-
MD5
13df48718f22e45e34ce0d63e4bcc85b
-
SHA1
cedd186cac1ce45eeee69e2521e5bd43f134b1d3
-
SHA256
054f6b9acce873cbd0267571c8d106897915db251cef4564dc8278a355efd922
-
SHA512
2acb5bc0eb666121aa6f8ea4741e0f2e657477935870fc2e825f3ed7c23f7dda9a52986bc77a913a57e22afe7a3aea2839905527935eee6694a88c41be0e5282
-
SSDEEP
3072:mR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu+:D25GgFny61mra0
Static task
static1
Behavioral task
behavioral1
Sample
054f6b9acce873cbd0267571c8d106897915db251cef4564dc8278a355efd922.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
054f6b9acce873cbd0267571c8d106897915db251cef4564dc8278a355efd922.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
054f6b9acce873cbd0267571c8d106897915db251cef4564dc8278a355efd922
-
Size
137KB
-
MD5
13df48718f22e45e34ce0d63e4bcc85b
-
SHA1
cedd186cac1ce45eeee69e2521e5bd43f134b1d3
-
SHA256
054f6b9acce873cbd0267571c8d106897915db251cef4564dc8278a355efd922
-
SHA512
2acb5bc0eb666121aa6f8ea4741e0f2e657477935870fc2e825f3ed7c23f7dda9a52986bc77a913a57e22afe7a3aea2839905527935eee6694a88c41be0e5282
-
SSDEEP
3072:mR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu+:D25GgFny61mra0
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1