Analysis
-
max time kernel
244s -
max time network
337s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 07:02
Static task
static1
Behavioral task
behavioral1
Sample
811499bc5b82b00331af58aa59d990744f4ccb5d5968beaea4304af7bedf3110.exe
Resource
win7-20221111-en
4 signatures
150 seconds
General
-
Target
811499bc5b82b00331af58aa59d990744f4ccb5d5968beaea4304af7bedf3110.exe
-
Size
278KB
-
MD5
9ddcdafde8ba775c90ed175289768a3f
-
SHA1
07b5062c4c7342d2a2dd90b44cb9439763efc454
-
SHA256
811499bc5b82b00331af58aa59d990744f4ccb5d5968beaea4304af7bedf3110
-
SHA512
a83c7170e88e8f84a3c6df26bd6f7f6e00a335bd680bf2817a9a228166beaa8606ce93bb81059847a2386776c20135d52601c6a21d35f50cab6f146a6a77142f
-
SSDEEP
6144:R3NvTgeWRMbYM0EKs6WmfDSWZJwQwQZExnZkqtkV3i:hNLgeWRMZ07pJxrsZkqSV3i
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1476-55-0x0000000000400000-0x0000000000478000-memory.dmp family_gh0strat -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\Window.dll 811499bc5b82b00331af58aa59d990744f4ccb5d5968beaea4304af7bedf3110.exe File created C:\Program Files\Common Files\Common.dll 811499bc5b82b00331af58aa59d990744f4ccb5d5968beaea4304af7bedf3110.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\vbcfg.ini 811499bc5b82b00331af58aa59d990744f4ccb5d5968beaea4304af7bedf3110.exe