General
-
Target
9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639
-
Size
5.7MB
-
Sample
230322-nlmawaad9t
-
MD5
ffa7d3236dc39beeda2da5f2b0596776
-
SHA1
c1a6afa1fc069c2bf93b1dcd59a646db253720bb
-
SHA256
9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639
-
SHA512
5016a5e3a483abfa841d2d8f33e7fbdb96bd4bd8119ae96a05cf2c5483f7fdbd5d7c333dfed63e9b94554637adebd982296e00e5fc2a3ffba3bd75e477349e7b
-
SSDEEP
98304:53YBvx6ppDENRyHDqAVMSBEzSmwAwfSqXgRfkgO6irkr5JfEw5zbLBJoAtv8YXny:WBv4ppDSDwMSCzSvAwKXormXLjdzwJ
Static task
static1
Behavioral task
behavioral1
Sample
9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639
-
Size
5.7MB
-
MD5
ffa7d3236dc39beeda2da5f2b0596776
-
SHA1
c1a6afa1fc069c2bf93b1dcd59a646db253720bb
-
SHA256
9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639
-
SHA512
5016a5e3a483abfa841d2d8f33e7fbdb96bd4bd8119ae96a05cf2c5483f7fdbd5d7c333dfed63e9b94554637adebd982296e00e5fc2a3ffba3bd75e477349e7b
-
SSDEEP
98304:53YBvx6ppDENRyHDqAVMSBEzSmwAwfSqXgRfkgO6irkr5JfEw5zbLBJoAtv8YXny:WBv4ppDSDwMSCzSvAwKXormXLjdzwJ
-
Gh0st RAT payload
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-