General
-
Target
1679446231214.zip
-
Size
8KB
-
Sample
230323-jqjckaec94
-
MD5
0e92729611a1de2fc9b9c2fc1f08a89b
-
SHA1
dd0a4a3c1511bfceffd342949cb4208a1cc39ece
-
SHA256
24c9a7115471a7ddc4361c6f3752e75a2318a6ffa4373eeab9e8a60d720268d0
-
SHA512
38db2440c375d32fae891bae9cd6bafd2b20c60eaed8c67e7485a08f43cb1a1cda765f4558998c6439d79e3886fcd2baafca444f0b84e18b0d6a9f3cb9027ad2
-
SSDEEP
192:o/Q1/+c2TgWmJfm+I54Y9IFtAQWH7Tlx7e7uhezNfQxM:oI1mczY+Dyhx1Gh
Static task
static1
Behavioral task
behavioral1
Sample
ӷƱ (03).exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
ӷƱ (03).exe
-
Size
36KB
-
MD5
bf0a28efc4c32b857332250dbb1d132a
-
SHA1
61039a5ec49b283775a232cb9c23ead25ca4d8d9
-
SHA256
0525947d2063f56a8288dd3d54210fc49a3a615c338c4bd7260731649f9b7e5b
-
SHA512
8ba699251c9a037d723b89b6edf57b1da0982e860983be4f340bd789214aff6ee98637999864641b281f9570ba3d60362c74c2ba151a1f3deb08cc9f84a7f6f0
-
SSDEEP
192:tXU60V/WmoI+af4R9JNRcJLef3Rmtj0IRmtSgUoynSYgH9L1nnCQBRmlFQ93M3pc:tk60V/wI4PJhGYSGS1EtdLVC+w7QSc
-
Gh0st RAT payload
-
Blocklisted process makes network request
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-