General
-
Target
108d77dce16c79be3ceb07e44c7465245017db0a0ab9d001a98d2ff1d53c2b04
-
Size
137KB
-
Sample
250310-yl6pmawny4
-
MD5
9d72fe3ec5856daa8fab0e6e2231d1be
-
SHA1
38575e9b90876d1089c7a16a2c0385d5ea84f171
-
SHA256
108d77dce16c79be3ceb07e44c7465245017db0a0ab9d001a98d2ff1d53c2b04
-
SHA512
1452346a75bac1bb5c37047e221b95e26b2f6341bbd20e443f6b9ae863bf3336f29b25b2d3252e175a1183ee76f7e93fa3afdabc99019e39e77678d2bc8574f1
-
SSDEEP
3072:lR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu/:o25GgFny61mraV
Static task
static1
Behavioral task
behavioral1
Sample
108d77dce16c79be3ceb07e44c7465245017db0a0ab9d001a98d2ff1d53c2b04.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
108d77dce16c79be3ceb07e44c7465245017db0a0ab9d001a98d2ff1d53c2b04.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
108d77dce16c79be3ceb07e44c7465245017db0a0ab9d001a98d2ff1d53c2b04
-
Size
137KB
-
MD5
9d72fe3ec5856daa8fab0e6e2231d1be
-
SHA1
38575e9b90876d1089c7a16a2c0385d5ea84f171
-
SHA256
108d77dce16c79be3ceb07e44c7465245017db0a0ab9d001a98d2ff1d53c2b04
-
SHA512
1452346a75bac1bb5c37047e221b95e26b2f6341bbd20e443f6b9ae863bf3336f29b25b2d3252e175a1183ee76f7e93fa3afdabc99019e39e77678d2bc8574f1
-
SSDEEP
3072:lR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu/:o25GgFny61mraV
Score10/10-
Gh0st RAT payload
-
Gh0strat family
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Port Monitors
Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.
-
Sets service image path in registry
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Port Monitors
1Registry Run Keys / Startup Folder
1