General
-
Target
0e2ba60ff9bf8095f7b3ad0f105e3b282ab4497c2849eec65a361dabba178ac4
-
Size
137KB
-
Sample
250310-yhvg7awmv8
-
MD5
05c01fc450536098a64204c97d9b7520
-
SHA1
5b512527f3bc20eddae0acb5dc725590126c042c
-
SHA256
0e2ba60ff9bf8095f7b3ad0f105e3b282ab4497c2849eec65a361dabba178ac4
-
SHA512
73a2d3888f5d9e24c4d3374c7540a57578bf5c2bc4b4e9783e50769ebaa3e8ae5846704df6e3d17656648a10ce557524147450d194a8c4041923dd065a08110f
-
SSDEEP
3072:gR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuJ:l25GgFny61mrab
Static task
static1
Behavioral task
behavioral1
Sample
0e2ba60ff9bf8095f7b3ad0f105e3b282ab4497c2849eec65a361dabba178ac4.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e2ba60ff9bf8095f7b3ad0f105e3b282ab4497c2849eec65a361dabba178ac4.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
0e2ba60ff9bf8095f7b3ad0f105e3b282ab4497c2849eec65a361dabba178ac4
-
Size
137KB
-
MD5
05c01fc450536098a64204c97d9b7520
-
SHA1
5b512527f3bc20eddae0acb5dc725590126c042c
-
SHA256
0e2ba60ff9bf8095f7b3ad0f105e3b282ab4497c2849eec65a361dabba178ac4
-
SHA512
73a2d3888f5d9e24c4d3374c7540a57578bf5c2bc4b4e9783e50769ebaa3e8ae5846704df6e3d17656648a10ce557524147450d194a8c4041923dd065a08110f
-
SSDEEP
3072:gR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUuJ:l25GgFny61mrab
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-