General
-
Target
47fd4fcbad0d377d2a4be0e17c4f58ec3de3ccb71b7c1107070c3b14ced7d7b9
-
Size
137KB
-
Sample
250305-avpwgatrv3
-
MD5
946389dc464e29da1f3448537cdd1afa
-
SHA1
08fcb8233737bf7b6b0ccc5f64b7225372c1e56f
-
SHA256
47fd4fcbad0d377d2a4be0e17c4f58ec3de3ccb71b7c1107070c3b14ced7d7b9
-
SHA512
a43a8730f0978a5730e39e3c5de7c7e8c546445ecf2ab5feda4ec15e1ad8a7b435c27391d9cf785943efaf3f1bb99179ca1c6dcf4a0d72de5b266fb6f1184f73
-
SSDEEP
3072:RR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuz:825GgFny61mraB
Static task
static1
Behavioral task
behavioral1
Sample
47fd4fcbad0d377d2a4be0e17c4f58ec3de3ccb71b7c1107070c3b14ced7d7b9.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
47fd4fcbad0d377d2a4be0e17c4f58ec3de3ccb71b7c1107070c3b14ced7d7b9.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
47fd4fcbad0d377d2a4be0e17c4f58ec3de3ccb71b7c1107070c3b14ced7d7b9
-
Size
137KB
-
MD5
946389dc464e29da1f3448537cdd1afa
-
SHA1
08fcb8233737bf7b6b0ccc5f64b7225372c1e56f
-
SHA256
47fd4fcbad0d377d2a4be0e17c4f58ec3de3ccb71b7c1107070c3b14ced7d7b9
-
SHA512
a43a8730f0978a5730e39e3c5de7c7e8c546445ecf2ab5feda4ec15e1ad8a7b435c27391d9cf785943efaf3f1bb99179ca1c6dcf4a0d72de5b266fb6f1184f73
-
SSDEEP
3072:RR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuz:825GgFny61mraB
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1