General
-
Target
6f341d47890b1b1f0f0b8cbc1c37483c0fa72a44a8af9c4e6c31479b95a6c36c
-
Size
137KB
-
Sample
250310-bv8t1sxrv2
-
MD5
3883ff1cf48e1e0f8d1c6232aeec1e7b
-
SHA1
18e316f31f3533365babf1f56d6b643da4fb41cd
-
SHA256
6f341d47890b1b1f0f0b8cbc1c37483c0fa72a44a8af9c4e6c31479b95a6c36c
-
SHA512
485c4bcfe8094ae7f497c5994578d9633035ae23f008239fb50e24d6d76af835a9a95b774ce52171652d2906b1603d821aae47c166f6a6bc5547bfa0805a0877
-
SSDEEP
3072:qR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUud:/25GgFny61mraH
Static task
static1
Behavioral task
behavioral1
Sample
6f341d47890b1b1f0f0b8cbc1c37483c0fa72a44a8af9c4e6c31479b95a6c36c.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6f341d47890b1b1f0f0b8cbc1c37483c0fa72a44a8af9c4e6c31479b95a6c36c.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
6f341d47890b1b1f0f0b8cbc1c37483c0fa72a44a8af9c4e6c31479b95a6c36c
-
Size
137KB
-
MD5
3883ff1cf48e1e0f8d1c6232aeec1e7b
-
SHA1
18e316f31f3533365babf1f56d6b643da4fb41cd
-
SHA256
6f341d47890b1b1f0f0b8cbc1c37483c0fa72a44a8af9c4e6c31479b95a6c36c
-
SHA512
485c4bcfe8094ae7f497c5994578d9633035ae23f008239fb50e24d6d76af835a9a95b774ce52171652d2906b1603d821aae47c166f6a6bc5547bfa0805a0877
-
SSDEEP
3072:qR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUud:/25GgFny61mraH
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1