General
-
Target
82037cd9975f3d10a78a756e22ac8545ba3f4a1f645ad0041c1fcfd29e39d23a
-
Size
137KB
-
Sample
250304-cwkn9axkv3
-
MD5
9715310a1d36c45d1f366b85c0f9a9ad
-
SHA1
9fb2099f4855730524862276b450f8d0f1bbe037
-
SHA256
82037cd9975f3d10a78a756e22ac8545ba3f4a1f645ad0041c1fcfd29e39d23a
-
SHA512
a2bd9cb035799bf9703d569e22dd7e6e15635aae7c27fbe4a92c1399f22ef4404783ccdb6786c74012d954dfe3468463dd965f64aad37c4aa164c9d1c9ddcd11
-
SSDEEP
3072:1R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUub:Y25GgFny61mraB
Static task
static1
Behavioral task
behavioral1
Sample
82037cd9975f3d10a78a756e22ac8545ba3f4a1f645ad0041c1fcfd29e39d23a.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
82037cd9975f3d10a78a756e22ac8545ba3f4a1f645ad0041c1fcfd29e39d23a.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
82037cd9975f3d10a78a756e22ac8545ba3f4a1f645ad0041c1fcfd29e39d23a
-
Size
137KB
-
MD5
9715310a1d36c45d1f366b85c0f9a9ad
-
SHA1
9fb2099f4855730524862276b450f8d0f1bbe037
-
SHA256
82037cd9975f3d10a78a756e22ac8545ba3f4a1f645ad0041c1fcfd29e39d23a
-
SHA512
a2bd9cb035799bf9703d569e22dd7e6e15635aae7c27fbe4a92c1399f22ef4404783ccdb6786c74012d954dfe3468463dd965f64aad37c4aa164c9d1c9ddcd11
-
SSDEEP
3072:1R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUub:Y25GgFny61mraB
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1