Analysis
-
max time kernel
41s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04-10-2022 03:21
Behavioral task
behavioral1
Sample
390b0f0076f49ca340733d0f351eba2ab00a07dfc4c593dc411708655120dceb.exe
Resource
win7-20220901-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
390b0f0076f49ca340733d0f351eba2ab00a07dfc4c593dc411708655120dceb.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
390b0f0076f49ca340733d0f351eba2ab00a07dfc4c593dc411708655120dceb.exe
-
Size
160KB
-
MD5
063d9ebb3764301d7aff87b848f74670
-
SHA1
bfe41c042b9732a471f24c7ad706545405c6987b
-
SHA256
390b0f0076f49ca340733d0f351eba2ab00a07dfc4c593dc411708655120dceb
-
SHA512
da3313d933847fbb3ed362bda7b901256f612c147a4eb63986e0963ac9f5a50928bfe8f75d78e03c305662ca95090a20045faa31b61cb4b5dbac9ab20e709bac
-
SSDEEP
3072:51vHS/onYGlo6DKfYZmn87sItcOUuDOd6/Z4pJR:KQl3uln27uOU+OdkG
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1816-55-0x0000000000400000-0x0000000000429000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\admin = "C:\\Users\\Admin\\AppData\\Local\\Temp\\390b0f0076f49ca340733d0f351eba2ab00a07dfc4c593dc411708655120dceb.exe" 390b0f0076f49ca340733d0f351eba2ab00a07dfc4c593dc411708655120dceb.exe