MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d066a84aa7198a0e30c6e655386ae8f000c024e468a3a99aad1b70e098ff53bd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gh0stRAT


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: d066a84aa7198a0e30c6e655386ae8f000c024e468a3a99aad1b70e098ff53bd
SHA3-384 hash: 4250f46fed039d72b1636a31a25588f82528518c0a743e503f2a7a8aea6e9a96d33dfae04a882a4ecd4efb55f42ac190
SHA1 hash: de0c6e6605a28a92dcadb955d8a87f0de98d431f
MD5 hash: a3f80a6d39ada2dfbef18b11b77045d7
humanhash: jupiter-avocado-wisconsin-pip
File name:INETCFG.dll
Download: download sample
Signature Gh0stRAT
File size:250'368 bytes
First seen:2022-05-21 16:13:42 UTC
Last seen:2022-05-23 13:19:27 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 48f60f3007cbe0083ef8c1479039df4e (1 x Gh0stRAT)
ssdeep 6144:W5r7ZN5u/+nLTQsR7iOeYBDQWpaxHOuZhV/KnnJf:0H5/w875eYBDTaxHOQhVKp
Threatray 2 similar samples on MalwareBazaar
TLSH T153342269E001D62BDF9FB633D5F1F3A52091596066BAFBC923DCE6C3BE5D62014E2600
TrID 54.9% (.EXE) UPX compressed Win32 Executable (27066/9/6)
13.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.1% (.EXE) Win32 Executable (generic) (4505/5/1)
4.1% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter obfusor
Tags:dll Gh0stRAT RAT

Intelligence


File Origin
# of uploads :
3
# of downloads :
324
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Creates an autostart registry key pointing to binary in C:\Windows
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 631597 Sample: INETCFG.dll Startdate: 21/05/2022 Architecture: WINDOWS Score: 52 22 Multi AV Scanner detection for submitted file 2->22 7 loaddll32.exe 1 2->7         started        9 rundll32.exe 2->9         started        11 rundll32.exe 2->11         started        process3 process4 13 rundll32.exe 1 7->13         started        16 cmd.exe 1 7->16         started        18 rundll32.exe 7->18         started        signatures5 24 Creates an autostart registry key pointing to binary in C:\Windows 13->24 20 rundll32.exe 16->20         started        process6
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2022-05-21 16:14:11 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
7 of 26 (26.92%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
persistence upx
Behaviour
Suspicious use of WriteProcessMemory
Adds Run key to start application
Unpacked files
SH256 hash:
b8bf7bff049a2fb9b7ee626649cce50ef17cff8deecaedf2703669176950329a
MD5 hash:
9f827305a1de183c828979c4711e2ec6
SHA1 hash:
6fecef0adf10f78820889d4f96f9a2c40c732786
SH256 hash:
d066a84aa7198a0e30c6e655386ae8f000c024e468a3a99aad1b70e098ff53bd
MD5 hash:
a3f80a6d39ada2dfbef18b11b77045d7
SHA1 hash:
de0c6e6605a28a92dcadb955d8a87f0de98d431f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments