General
-
Target
b010d2864feeb0a22408a6b8da6be8e7eb5b89f9de0a4f615ae097080843647f
-
Size
137KB
-
Sample
250304-f48mts1xbx
-
MD5
9163475dbaf9a5b55fcdd56bbf9a6909
-
SHA1
9e4f41dd4c0d1f398bf72a2baa2d2c3294c2af3e
-
SHA256
b010d2864feeb0a22408a6b8da6be8e7eb5b89f9de0a4f615ae097080843647f
-
SHA512
fa6e635a78f5fc73d5c31ed8424e76c28dfd7eed19328da8fd75f609aa091b94e0239335391aedef6fc062f6dc2c0b3d2ca8fde28164bd4fc4318057660a870e
-
SSDEEP
3072:PR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUut:y25GgFny61mraT
Static task
static1
Behavioral task
behavioral1
Sample
b010d2864feeb0a22408a6b8da6be8e7eb5b89f9de0a4f615ae097080843647f.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b010d2864feeb0a22408a6b8da6be8e7eb5b89f9de0a4f615ae097080843647f.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
b010d2864feeb0a22408a6b8da6be8e7eb5b89f9de0a4f615ae097080843647f
-
Size
137KB
-
MD5
9163475dbaf9a5b55fcdd56bbf9a6909
-
SHA1
9e4f41dd4c0d1f398bf72a2baa2d2c3294c2af3e
-
SHA256
b010d2864feeb0a22408a6b8da6be8e7eb5b89f9de0a4f615ae097080843647f
-
SHA512
fa6e635a78f5fc73d5c31ed8424e76c28dfd7eed19328da8fd75f609aa091b94e0239335391aedef6fc062f6dc2c0b3d2ca8fde28164bd4fc4318057660a870e
-
SSDEEP
3072:PR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUut:y25GgFny61mraT
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1