General
-
Target
d46dbbb40bf11bda9b1aa74d9d2550a73ab0ae6008270c2c541153cd4974a3dd.zip
-
Size
610KB
-
Sample
230321-ryvdssbb83
-
MD5
7a8d94fd3aa3197094a043c56d44787e
-
SHA1
b012c3e7f5a5585b4645172cd23e9e497e72abaa
-
SHA256
8dc79d8a4114dc40786da9991a58093e8815acc91a2c4603583bf2d2cfee10f2
-
SHA512
e8a1c2bfa1f2f47fba5fa4ee717062f592b7964d9ed80845b1d857fe9224382f95ae6b024b5e6dd97885c6c57ee1be0af6074ff31ea2821aa2a96b0852e054c6
-
SSDEEP
12288:rDGhwLeHKiGX0kLMt568eXorUCDDzFVvS31KFj3xGysgeV4reNaBrwQ:rRLeZKY568QGtDzFc2xGyXkuYywQ
Static task
static1
Behavioral task
behavioral1
Sample
d46dbbb40bf11bda9b1aa74d9d2550a73ab0ae6008270c2c541153cd4974a3dd.exe
Resource
win7-20230220-en
Malware Config
Extracted
gh0strat
103.143.12.157
Targets
-
-
Target
d46dbbb40bf11bda9b1aa74d9d2550a73ab0ae6008270c2c541153cd4974a3dd.exe
-
Size
621KB
-
MD5
1a5fed7b02d73b3589cebd2394fe7ce9
-
SHA1
3c1c9668e5595ae8034b97516bbacea5ab914666
-
SHA256
d46dbbb40bf11bda9b1aa74d9d2550a73ab0ae6008270c2c541153cd4974a3dd
-
SHA512
0d06238afa6c5178865a0dc55af91ee79d7d18bb21d9837eb7316c7f73f8f0d6002f1f583cb6d0b2a868223f97c31a6ca00c33aed799dcef814d77c7d96a7988
-
SSDEEP
12288:0MDDEEuqctaY5effnWQ7x7dJsPMR1F4fWDNo5F/oJBprSqYeJGDH12AlgC9h:0MDoTqctaY5effnW8RDsXOvvYp19lgCf
-
Gh0st RAT payload
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-