General
-
Target
a82682928a8be327837375976c22a0af431ccaf4c9b6b3e1397642682f643c70
-
Size
137KB
-
Sample
250304-fj1fqa1saw
-
MD5
6bccae8ccfc028f384394142705bcfbc
-
SHA1
65a88ab2784797afe21137528f0cbc889047141a
-
SHA256
a82682928a8be327837375976c22a0af431ccaf4c9b6b3e1397642682f643c70
-
SHA512
ad4a705999ab615ba41f085deb8b0934c5df00f4cd6c5ccb96c5ef6572a00adb9d7092107e4714140c22d390a2ed32eef7f76c7306b59a650d376f7f53f1183a
-
SSDEEP
3072:aR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuX:P25GgFny61mraV
Static task
static1
Behavioral task
behavioral1
Sample
a82682928a8be327837375976c22a0af431ccaf4c9b6b3e1397642682f643c70.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a82682928a8be327837375976c22a0af431ccaf4c9b6b3e1397642682f643c70.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
a82682928a8be327837375976c22a0af431ccaf4c9b6b3e1397642682f643c70
-
Size
137KB
-
MD5
6bccae8ccfc028f384394142705bcfbc
-
SHA1
65a88ab2784797afe21137528f0cbc889047141a
-
SHA256
a82682928a8be327837375976c22a0af431ccaf4c9b6b3e1397642682f643c70
-
SHA512
ad4a705999ab615ba41f085deb8b0934c5df00f4cd6c5ccb96c5ef6572a00adb9d7092107e4714140c22d390a2ed32eef7f76c7306b59a650d376f7f53f1183a
-
SSDEEP
3072:aR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuX:P25GgFny61mraV
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1