General
-
Target
49b3c9c6259fec638f4296884355d0a5c31c112960c75944d4f038e038ede51c
-
Size
137KB
-
Sample
250305-a2b8ystxhw
-
MD5
26d431dccfe26b31a24d4d0c674f08dd
-
SHA1
04133708ade1ef636ae8eb3404bc2936f5cab9ed
-
SHA256
49b3c9c6259fec638f4296884355d0a5c31c112960c75944d4f038e038ede51c
-
SHA512
8c95814a536a6f27b0e0855a8ee61f7797994b39ff57aaa10eada306e3bf84cc4e617fa279d07381c4f47ffbd17112965c67c659d55b5fae642692cb4774e91d
-
SSDEEP
3072:cR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuX:p25GgFny61mra9
Static task
static1
Behavioral task
behavioral1
Sample
49b3c9c6259fec638f4296884355d0a5c31c112960c75944d4f038e038ede51c.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
49b3c9c6259fec638f4296884355d0a5c31c112960c75944d4f038e038ede51c.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
49b3c9c6259fec638f4296884355d0a5c31c112960c75944d4f038e038ede51c
-
Size
137KB
-
MD5
26d431dccfe26b31a24d4d0c674f08dd
-
SHA1
04133708ade1ef636ae8eb3404bc2936f5cab9ed
-
SHA256
49b3c9c6259fec638f4296884355d0a5c31c112960c75944d4f038e038ede51c
-
SHA512
8c95814a536a6f27b0e0855a8ee61f7797994b39ff57aaa10eada306e3bf84cc4e617fa279d07381c4f47ffbd17112965c67c659d55b5fae642692cb4774e91d
-
SSDEEP
3072:cR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuX:p25GgFny61mra9
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1