General
-
Target
78907409a6014a12aa0b2f0db5fb3a87e03a5b75a9709238ceaf96812e40c8c3
-
Size
137KB
-
Sample
250306-fsmk8ayzay
-
MD5
7d0b0c5a6e29785e4c0da7c8bcb35517
-
SHA1
4f84477557111dc5ee6f4928e03a447a6ef27df4
-
SHA256
78907409a6014a12aa0b2f0db5fb3a87e03a5b75a9709238ceaf96812e40c8c3
-
SHA512
c123fcbcfdf1f3bea2ac109c3f19f47a5916a6daaad8edcefda3a0d9d06769ed8d5f0c6caf24eab69a36fbbaaaa1f95dfb24cb6ee8ff7c00bc4d8fba765776a9
-
SSDEEP
3072:xR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuP:c25GgFny61mraB
Static task
static1
Behavioral task
behavioral1
Sample
78907409a6014a12aa0b2f0db5fb3a87e03a5b75a9709238ceaf96812e40c8c3.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
78907409a6014a12aa0b2f0db5fb3a87e03a5b75a9709238ceaf96812e40c8c3.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
78907409a6014a12aa0b2f0db5fb3a87e03a5b75a9709238ceaf96812e40c8c3
-
Size
137KB
-
MD5
7d0b0c5a6e29785e4c0da7c8bcb35517
-
SHA1
4f84477557111dc5ee6f4928e03a447a6ef27df4
-
SHA256
78907409a6014a12aa0b2f0db5fb3a87e03a5b75a9709238ceaf96812e40c8c3
-
SHA512
c123fcbcfdf1f3bea2ac109c3f19f47a5916a6daaad8edcefda3a0d9d06769ed8d5f0c6caf24eab69a36fbbaaaa1f95dfb24cb6ee8ff7c00bc4d8fba765776a9
-
SSDEEP
3072:xR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuP:c25GgFny61mraB
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1