Analysis

  • max time kernel
    41s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 20:32

General

  • Target

    733dde6099a374280b846fb1505f5d33e5b4e5519d04ec851240209f530648ec.exe

  • Size

    50KB

  • MD5

    0f44151e523426ec0fd490a5753a0200

  • SHA1

    8728b38a58c0b853afce10e623652c20c824d5ee

  • SHA256

    733dde6099a374280b846fb1505f5d33e5b4e5519d04ec851240209f530648ec

  • SHA512

    acd0d664e01df5e6ec531ef9d04e0b04c47d5902190ff6a6098c2c616c7920148a8373b2ac94ee2a0885d5353e7f3b2d57725610e462249e1e33b3a52f5255c0

  • SSDEEP

    1536:ioIphHn+jqLe9Rt41am59t6NTBAM508yZa7C1xN:iFph5Le97mn0NTXyEw

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\733dde6099a374280b846fb1505f5d33e5b4e5519d04ec851240209f530648ec.exe
    "C:\Users\Admin\AppData\Local\Temp\733dde6099a374280b846fb1505f5d33e5b4e5519d04ec851240209f530648ec.exe"
    1⤵
      PID:2016

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2016-54-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/2016-55-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB