Overview
overview
8Static
static
81433_hack4...st.exe
windows7-x64
81433_hack4...st.exe
windows10-2004-x64
11433_hack4...��.exe
windows7-x64
81433_hack4...��.exe
windows10-2004-x64
81433_hack4...er.exe
windows7-x64
1433_hack4...er.exe
windows10-2004-x64
1433_hack4...me.swf
windows7-x64
31433_hack4...me.swf
windows10-2004-x64
31433_hack4...in.url
windows7-x64
61433_hack4...in.url
windows10-2004-x64
1433_hack4...��.url
windows7-x64
11433_hack4...��.url
windows10-2004-x64
11433_hack4...��.url
windows7-x64
11433_hack4...��.url
windows10-2004-x64
11433_hack4...13.exe
windows7-x64
11433_hack4...13.exe
windows10-2004-x64
11433_hack4...14.exe
windows7-x64
11433_hack4...14.exe
windows10-2004-x64
11433_hack4...��.exe
windows7-x64
81433_hack4...��.exe
windows10-2004-x64
81433_hack4....5.exe
windows7-x64
81433_hack4....5.exe
windows10-2004-x64
81433_hack4...nH.dll
windows7-x64
81433_hack4...nH.dll
windows10-2004-x64
1433_hack4...��.exe
windows7-x64
11433_hack4...��.exe
windows10-2004-x64
11433_hack4...fs.exe
windows7-x64
61433_hack4...fs.exe
windows10-2004-x64
1433_hack4...ex.hta
windows7-x64
11433_hack4...ex.hta
windows10-2004-x64
11433_hack4...SD.exe
windows7-x64
31433_hack4...SD.exe
windows10-2004-x64
3Analysis
-
max time kernel
62s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 18:02
Behavioral task
behavioral1
Sample
1433_hack44.cn/12-18/Gh0st.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1433_hack44.cn/12-18/Gh0st.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
1433_hack44.cn/12-18/MD5修改器.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
1433_hack44.cn/12-18/MD5修改器.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
1433_hack44.cn/12-18/update/Server.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
1433_hack44.cn/12-18/update/Server.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
1433_hack44.cn/12-18/update/look me.swf
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
1433_hack44.cn/12-18/update/look me.swf
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
1433_hack44.cn/12-18/update/skin.url
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
1433_hack44.cn/12-18/update/skin.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
1433_hack44.cn/12-18/update/使用方法.url
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
1433_hack44.cn/12-18/update/使用方法.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
1433_hack44.cn/12-18/update/华中帝国收集整理.url
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
1433_hack44.cn/12-18/update/华中帝国收集整理.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
1433_hack44.cn/FTP2013.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
1433_hack44.cn/FTP2013.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
1433_hack44.cn/NB12-18/2014.exe
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
1433_hack44.cn/NB12-18/2014.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
1433_hack44.cn/NB12-18/MD5修改器.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
1433_hack44.cn/NB12-18/MD5修改器.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
1433_hack44.cn/NB12-18/NetBot5.5.exe
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
1433_hack44.cn/NB12-18/NetBot5.5.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
1433_hack44.cn/NB12-18/SkinH.dll
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
1433_hack44.cn/NB12-18/SkinH.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral25
Sample
1433_hack44.cn/NB12-18/免杀审核.exe
Resource
win7-20221111-en
Behavioral task
behavioral26
Sample
1433_hack44.cn/NB12-18/免杀审核.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral27
Sample
1433_hack44.cn/hfs2_3b285/hfs.exe
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
1433_hack44.cn/hfs2_3b285/hfs.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral29
Sample
1433_hack44.cn/乌龙寺1433/FTPHEX/Hex.hta
Resource
win7-20221111-en
Behavioral task
behavioral30
Sample
1433_hack44.cn/乌龙寺1433/FTPHEX/Hex.hta
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
1433_hack44.cn/乌龙寺1433/FTPHEX/KSD.exe
Resource
win7-20220901-en
Behavioral task
behavioral32
Sample
1433_hack44.cn/乌龙寺1433/FTPHEX/KSD.exe
Resource
win10v2004-20220812-en
General
-
Target
1433_hack44.cn/12-18/Gh0st.exe
-
Size
2.6MB
-
MD5
2c691584a50ac8cdfc05f2fb54440a1d
-
SHA1
baf0ea2cc4f40e50c22103555467b397c01ef2b1
-
SHA256
9d6f5d85e3563556b1e96191e536807d9973b6210b4893f14eaefdb90425a212
-
SHA512
287f652ee5066f641c18b6db342e0c768ee209fdcb7a0e23885ec762a7559ecd35db511e421128e6e06317989f7c6469302e412056f328d021d3b11f53e1372b
-
SSDEEP
49152:q0hYlq/48tcZUhOhEwj26ntNqn3njurXHMYVTuVbX59ku:q0h+q2Ghg3wn3jur7VKd5t
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2032-59-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-60-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-61-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-63-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-65-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-67-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-69-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-71-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-73-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-75-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-77-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-79-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-81-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-83-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-85-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-87-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-89-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-93-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-95-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-99-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-97-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-91-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-101-0x0000000010000000-0x000000001003C000-memory.dmp upx behavioral1/memory/2032-102-0x0000000010000000-0x000000001003C000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Gh0st.exepid process 2032 Gh0st.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Gh0st.exepid process 2032 Gh0st.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
Gh0st.exepid process 2032 Gh0st.exe 2032 Gh0st.exe 2032 Gh0st.exe