General
-
Target
575674e2fb7bd513c65dc1f6975e97ff1af84c92892bcb52e5ffa87a8f777efc
-
Size
137KB
-
Sample
250306-clwzjawk19
-
MD5
6a33b6e87a17a8a45907adc675c01cf4
-
SHA1
4b8ca530574f775086e9c5b7a02a3856453c7d24
-
SHA256
575674e2fb7bd513c65dc1f6975e97ff1af84c92892bcb52e5ffa87a8f777efc
-
SHA512
60f4ccea934a2b76e75d341654de517583ec7f31a4e03e17608bad1f2a6fed80b1c154856d81ffecf780371518c4cc8fe3b102d29747659efe464af016e71cbd
-
SSDEEP
3072:WR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuI:T25GgFny61mra6
Static task
static1
Behavioral task
behavioral1
Sample
575674e2fb7bd513c65dc1f6975e97ff1af84c92892bcb52e5ffa87a8f777efc.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
575674e2fb7bd513c65dc1f6975e97ff1af84c92892bcb52e5ffa87a8f777efc.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
575674e2fb7bd513c65dc1f6975e97ff1af84c92892bcb52e5ffa87a8f777efc
-
Size
137KB
-
MD5
6a33b6e87a17a8a45907adc675c01cf4
-
SHA1
4b8ca530574f775086e9c5b7a02a3856453c7d24
-
SHA256
575674e2fb7bd513c65dc1f6975e97ff1af84c92892bcb52e5ffa87a8f777efc
-
SHA512
60f4ccea934a2b76e75d341654de517583ec7f31a4e03e17608bad1f2a6fed80b1c154856d81ffecf780371518c4cc8fe3b102d29747659efe464af016e71cbd
-
SSDEEP
3072:WR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuI:T25GgFny61mra6
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-