General
-
Target
abcf9b1e860c48449ea576a68c97ed30608af335cc1f22283285ba703e13c100
-
Size
137KB
-
Sample
250310-fcxfgss1dx
-
MD5
0da67c3b5cebed1d0e29ce8fadb72ba5
-
SHA1
f28e2d759a3cef3eb3baabf39360fa94c3541eeb
-
SHA256
abcf9b1e860c48449ea576a68c97ed30608af335cc1f22283285ba703e13c100
-
SHA512
c5fe8705d0300d865203f2c8b9b410c03bd94c88d13d2e2a352c2624dd6973af2499bd410f75ababbabee082b13cf59baf5956fefee7228a2e7e2a51082b188c
-
SSDEEP
3072:VR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUux:425GgFny61mraT
Static task
static1
Behavioral task
behavioral1
Sample
abcf9b1e860c48449ea576a68c97ed30608af335cc1f22283285ba703e13c100.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
abcf9b1e860c48449ea576a68c97ed30608af335cc1f22283285ba703e13c100.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
abcf9b1e860c48449ea576a68c97ed30608af335cc1f22283285ba703e13c100
-
Size
137KB
-
MD5
0da67c3b5cebed1d0e29ce8fadb72ba5
-
SHA1
f28e2d759a3cef3eb3baabf39360fa94c3541eeb
-
SHA256
abcf9b1e860c48449ea576a68c97ed30608af335cc1f22283285ba703e13c100
-
SHA512
c5fe8705d0300d865203f2c8b9b410c03bd94c88d13d2e2a352c2624dd6973af2499bd410f75ababbabee082b13cf59baf5956fefee7228a2e7e2a51082b188c
-
SSDEEP
3072:VR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUux:425GgFny61mraT
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1