General
-
Target
517c57c3996f8aef1df04fac777082b78771476c627849898f4a435d0e540278
-
Size
375KB
-
Sample
220806-jclwjaeee9
-
MD5
c51d0fdd78ca5e509f20769db737486b
-
SHA1
fb98116951beb903e34955e566b16ee3f53ef419
-
SHA256
517c57c3996f8aef1df04fac777082b78771476c627849898f4a435d0e540278
-
SHA512
3cf0251c49e24417bc7e8554c1e6a3bf3dda9a35c7a610437c409fa5348379b5839ef65ebf6192d73652d787eef1e105e43db991b8fe5e87e841b7268613e7ec
Static task
static1
Malware Config
Targets
-
-
Target
517c57c3996f8aef1df04fac777082b78771476c627849898f4a435d0e540278
-
Size
375KB
-
MD5
c51d0fdd78ca5e509f20769db737486b
-
SHA1
fb98116951beb903e34955e566b16ee3f53ef419
-
SHA256
517c57c3996f8aef1df04fac777082b78771476c627849898f4a435d0e540278
-
SHA512
3cf0251c49e24417bc7e8554c1e6a3bf3dda9a35c7a610437c409fa5348379b5839ef65ebf6192d73652d787eef1e105e43db991b8fe5e87e841b7268613e7ec
-
Gh0st RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-