MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1d6a15ba8db94e23fb746ed7aab2f8d1857c8b3fa99a8ab76e825c3814e961ea. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gh0stRAT


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: 1d6a15ba8db94e23fb746ed7aab2f8d1857c8b3fa99a8ab76e825c3814e961ea
SHA3-384 hash: 6597014e3b56cca8990581074f422ea76719223c9e38a0ffb90b3b343c746036394b4721fd2ff460f3e0b9c22037ed07
SHA1 hash: fae5bd7706b28ee81ab69d512925041aafce7989
MD5 hash: 0b7ea40e0f0c86820fb5b3656a9aca1c
humanhash: maine-april-fifteen-zebra
File name:ps.ps1
Download: download sample
Signature Gh0stRAT
File size:13'965 bytes
First seen:2024-08-26 12:30:42 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 192:ldYe9lxhCyExKNP7FEzngySCinQ7RDdtDarp9pQna3COA3dJlDPMSRCQ7RDdtD/:/XPXCHKNjFIjinILSFA3z1UoCILD
TLSH T1C8525B44BF3B668C9BDF550CD1F80B4DB65695A328B41911E26FFD602A6E88C09FC1AC
Magika powershell
Reporter JAMESWT_WT
Tags:118-107-42-23 Gh0stRAT ps1

Intelligence


File Origin
# of uploads :
1
# of downloads :
136
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.9%
Tags:
Generic Network Stealth
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
evasive reflection
Result
Verdict:
MALICIOUS
Details
Base64 Encoded Powershell Directives
Detected one or more base64 encoded Powershell directives.
Result
Threat name:
GhostRat, Metasploit, UACMe
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found suspicious powershell code related to unpacking or dynamic code loading
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Opens the same file many times (likely Sandbox evasion)
Suricata IDS alerts for network traffic
Yara detected GhostRat
Yara detected MetasploitPayload
Yara detected UAC Bypass using CMSTP
Yara detected UACMe UAC Bypass tool
Behaviour
Behavior Graph:
Threat name:
Script-PowerShell.Trojan.Pantera
Status:
Malicious
First seen:
2024-08-26 12:31:05 UTC
File Type:
Text (PowerShell)
AV detection:
13 of 38 (34.21%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  8/10
Tags:
execution
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Uses Task Scheduler COM API
Uses Volume Shadow Copy WMI provider
Uses Volume Shadow Copy service COM API
Command and Scripting Interpreter: PowerShell
Enumerates connected drives
Blocklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Base64_Encoded_Powershell_Directives

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments