General
-
Target
ba23ee09e603d260c4cd458e1269c79cce7988d82f41494f7639a5740c13065e
-
Size
137KB
-
Sample
250304-gsyh6asrv2
-
MD5
306adff5489da3f19eb8344d2d9f7aa2
-
SHA1
b839577d3c900b7065a0a6b91ac38aeda0b6b7c0
-
SHA256
ba23ee09e603d260c4cd458e1269c79cce7988d82f41494f7639a5740c13065e
-
SHA512
50e07ffa6dde7ce861573f750779656115ccc04f852339ea26f804771af82662163c41a8b283bf1126eede44437ed461ff6d5e4c6124a9d5eaeffca5e9021f79
-
SSDEEP
3072:TR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUus:+25GgFny61mraC
Static task
static1
Behavioral task
behavioral1
Sample
ba23ee09e603d260c4cd458e1269c79cce7988d82f41494f7639a5740c13065e.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ba23ee09e603d260c4cd458e1269c79cce7988d82f41494f7639a5740c13065e.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
ba23ee09e603d260c4cd458e1269c79cce7988d82f41494f7639a5740c13065e
-
Size
137KB
-
MD5
306adff5489da3f19eb8344d2d9f7aa2
-
SHA1
b839577d3c900b7065a0a6b91ac38aeda0b6b7c0
-
SHA256
ba23ee09e603d260c4cd458e1269c79cce7988d82f41494f7639a5740c13065e
-
SHA512
50e07ffa6dde7ce861573f750779656115ccc04f852339ea26f804771af82662163c41a8b283bf1126eede44437ed461ff6d5e4c6124a9d5eaeffca5e9021f79
-
SSDEEP
3072:TR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUus:+25GgFny61mraC
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1