General
-
Target
tmp
-
Size
396KB
-
Sample
220923-qg73wsggh2
-
MD5
fd2b5d4d3603c053932eefa363d9dfd9
-
SHA1
3a98a6897f622e841f9a6e64b35aeef169ccb518
-
SHA256
f1a0004d18648fa4e83aa95b51cf4c3f14b9de9335222b911cdf7f10534dd52e
-
SHA512
c1418cd6105596a5ee6c80bd9fd793c0e6d14250c9f3c2db8c38ee83b3434d157baeea03c321b23d5ade1c9a9eec21c618f2e6c5d3bdfd94aed7f88493b35163
-
SSDEEP
12288:sb5DbPowllDRf9Ib2JONfUcri1RcQP2a5:s9Dbg6lV9C2JOBUIc12a5
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Malware Config
Targets
-
-
Target
tmp
-
Size
396KB
-
MD5
fd2b5d4d3603c053932eefa363d9dfd9
-
SHA1
3a98a6897f622e841f9a6e64b35aeef169ccb518
-
SHA256
f1a0004d18648fa4e83aa95b51cf4c3f14b9de9335222b911cdf7f10534dd52e
-
SHA512
c1418cd6105596a5ee6c80bd9fd793c0e6d14250c9f3c2db8c38ee83b3434d157baeea03c321b23d5ade1c9a9eec21c618f2e6c5d3bdfd94aed7f88493b35163
-
SSDEEP
12288:sb5DbPowllDRf9Ib2JONfUcri1RcQP2a5:s9Dbg6lV9C2JOBUIc12a5
-
Gh0st RAT payload
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-