Analysis
-
max time kernel
250s -
max time network
291s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 01:37
Behavioral task
behavioral1
Sample
f5161c7a7c039a26dbe5f8c8169ebff2d03a03c224ff4c238c0e0bdd163ec202.exe
Resource
win7-20220812-en
windows7-x64
8 signatures
150 seconds
General
-
Target
f5161c7a7c039a26dbe5f8c8169ebff2d03a03c224ff4c238c0e0bdd163ec202.exe
-
Size
134KB
-
MD5
f2603da9a089e3511fdb94a867664ba4
-
SHA1
c6aa5c4fb170547e4a865f29789a8b558098704c
-
SHA256
f5161c7a7c039a26dbe5f8c8169ebff2d03a03c224ff4c238c0e0bdd163ec202
-
SHA512
796d4b82122361da7f4b5b63072a72dfddedbaf2cc21850a76882c29588c091900bd75df8efea7f87342b0bda5ac34b3f7377e0cf53f6fa945a6bb438d5b17c1
-
SSDEEP
3072:XHJop67/l26U8Fj+rW6MngUi0k0lKkozwkpgRwqMfNd:3gvH9UHrKkqwk6iqMf
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/3212-132-0x0000000000400000-0x0000000000425000-memory.dmp family_gh0strat behavioral2/memory/3212-133-0x0000000000400000-0x0000000000425000-memory.dmp family_gh0strat -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3212 f5161c7a7c039a26dbe5f8c8169ebff2d03a03c224ff4c238c0e0bdd163ec202.exe 3212 f5161c7a7c039a26dbe5f8c8169ebff2d03a03c224ff4c238c0e0bdd163ec202.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 656 Process not Found