General
-
Target
56bb13a4a573793f62d3740f08f8dedb133dac10d67957c1bbbde43cef165f23
-
Size
36KB
-
Sample
220725-k684labgfq
-
MD5
a51da44302e62efe00eed42d9b570622
-
SHA1
a76b15753a853e6a222d301d88eb60e92479f2f1
-
SHA256
56bb13a4a573793f62d3740f08f8dedb133dac10d67957c1bbbde43cef165f23
-
SHA512
b90b471965ab16e7167928c45266b07a8139cdecebbaed16566c48bbb7d484e8b955fb744bb3322f0d5f300ab8e59e5569525cda67a75e9466338cd4f0e79d43
Static task
static1
Behavioral task
behavioral1
Sample
56bb13a4a573793f62d3740f08f8dedb133dac10d67957c1bbbde43cef165f23.exe
Resource
win7-20220715-en
Malware Config
Targets
-
-
Target
56bb13a4a573793f62d3740f08f8dedb133dac10d67957c1bbbde43cef165f23
-
Size
36KB
-
MD5
a51da44302e62efe00eed42d9b570622
-
SHA1
a76b15753a853e6a222d301d88eb60e92479f2f1
-
SHA256
56bb13a4a573793f62d3740f08f8dedb133dac10d67957c1bbbde43cef165f23
-
SHA512
b90b471965ab16e7167928c45266b07a8139cdecebbaed16566c48bbb7d484e8b955fb744bb3322f0d5f300ab8e59e5569525cda67a75e9466338cd4f0e79d43
-
Gh0st RAT payload
-
suricata: ET MALWARE PCRat/Gh0st CnC Beacon Request (Xfire variant)
suricata: ET MALWARE PCRat/Gh0st CnC Beacon Request (Xfire variant)
-