General
-
Target
39c02e646649120020be6c86778a02e4c46fb79cf7db816e79fc7998da3a3131
-
Size
2.6MB
-
Sample
230315-qzlbvafe2s
-
MD5
344573557b9ed92d639acf191a4538ab
-
SHA1
c0ee613f353b1c0e7eaa343d9aa053bca9a87e5b
-
SHA256
39c02e646649120020be6c86778a02e4c46fb79cf7db816e79fc7998da3a3131
-
SHA512
1696319e3cf92f8548c25442b587571e818f167e4492a08ea4d26e49ae3f54f2461c8e5168696418b510d794d5c8d8cd35f0a3ddb6095793652381e36344f5a7
-
SSDEEP
24576:8jrINGHhvax4WwOAR++r+1UIMj7GyifH3psEiNfxyyjj5ddddi66Prip11pA:arIN4k4/M+r+1Upj7GyifH3psE/ipTq
Static task
static1
Behavioral task
behavioral1
Sample
39c02e646649120020be6c86778a02e4c46fb79cf7db816e79fc7998da3a3131.dll
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
39c02e646649120020be6c86778a02e4c46fb79cf7db816e79fc7998da3a3131
-
Size
2.6MB
-
MD5
344573557b9ed92d639acf191a4538ab
-
SHA1
c0ee613f353b1c0e7eaa343d9aa053bca9a87e5b
-
SHA256
39c02e646649120020be6c86778a02e4c46fb79cf7db816e79fc7998da3a3131
-
SHA512
1696319e3cf92f8548c25442b587571e818f167e4492a08ea4d26e49ae3f54f2461c8e5168696418b510d794d5c8d8cd35f0a3ddb6095793652381e36344f5a7
-
SSDEEP
24576:8jrINGHhvax4WwOAR++r+1UIMj7GyifH3psEiNfxyyjj5ddddi66Prip11pA:arIN4k4/M+r+1Upj7GyifH3psE/ipTq
-
Gh0st RAT payload
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-