General
-
Target
b5f7ee792e4f392e0b0c9c81ba611a8f8d5113e94a4c6817c88732b930ad125a
-
Size
137KB
-
Sample
250308-p382msxtfx
-
MD5
81900cd819492780dc690684861baad8
-
SHA1
9847e82c0d4e62af4ff39b80ffda5e232d7156fb
-
SHA256
b5f7ee792e4f392e0b0c9c81ba611a8f8d5113e94a4c6817c88732b930ad125a
-
SHA512
ec2134711b9f7c77d04c972a557a5a448df6d97a8d97bf35f573b49593619b32bb0989e1151f89b5188e7eb5509bd784ec6feadf0d9b75775c56f00f2cfdc7fd
-
SSDEEP
3072:0R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuT:x25GgFny61mra9
Static task
static1
Behavioral task
behavioral1
Sample
b5f7ee792e4f392e0b0c9c81ba611a8f8d5113e94a4c6817c88732b930ad125a.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b5f7ee792e4f392e0b0c9c81ba611a8f8d5113e94a4c6817c88732b930ad125a.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
b5f7ee792e4f392e0b0c9c81ba611a8f8d5113e94a4c6817c88732b930ad125a
-
Size
137KB
-
MD5
81900cd819492780dc690684861baad8
-
SHA1
9847e82c0d4e62af4ff39b80ffda5e232d7156fb
-
SHA256
b5f7ee792e4f392e0b0c9c81ba611a8f8d5113e94a4c6817c88732b930ad125a
-
SHA512
ec2134711b9f7c77d04c972a557a5a448df6d97a8d97bf35f573b49593619b32bb0989e1151f89b5188e7eb5509bd784ec6feadf0d9b75775c56f00f2cfdc7fd
-
SSDEEP
3072:0R02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuT:x25GgFny61mra9
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1