General
-
Target
11eacb8e421fbc90070634853b734c26.exe
-
Size
768KB
-
Sample
230324-hh3ksscg36
-
MD5
11eacb8e421fbc90070634853b734c26
-
SHA1
285fc883e56317aeb1200a63f11535495ed7c04d
-
SHA256
fcbf0434298b9bac4e986835686ae0af18231736c4fe218cd4ef75ebe3e68c8f
-
SHA512
a0231e70b4a88730f8e976864431e8e960ed840164a02e95c4f76889676c42031e597041bb17e0ccec7f07800bf8a41b988a3374fce868ebfc9484db8e34bc5f
-
SSDEEP
12288:UgEAT7WiE9oDAGh9KvcX7wu1CgtIjvQuFv2UTpcEfZ6IKbfynbF+h3s6BOZ1m+Zb:J3m9s99L7wu1tsvz2UeQZ6IKWZ+doW+o
Behavioral task
behavioral1
Sample
11eacb8e421fbc90070634853b734c26.exe
Resource
win7-20230220-en
Malware Config
Extracted
gh0strat
3012.qmananan.com
Targets
-
-
Target
11eacb8e421fbc90070634853b734c26.exe
-
Size
768KB
-
MD5
11eacb8e421fbc90070634853b734c26
-
SHA1
285fc883e56317aeb1200a63f11535495ed7c04d
-
SHA256
fcbf0434298b9bac4e986835686ae0af18231736c4fe218cd4ef75ebe3e68c8f
-
SHA512
a0231e70b4a88730f8e976864431e8e960ed840164a02e95c4f76889676c42031e597041bb17e0ccec7f07800bf8a41b988a3374fce868ebfc9484db8e34bc5f
-
SSDEEP
12288:UgEAT7WiE9oDAGh9KvcX7wu1CgtIjvQuFv2UTpcEfZ6IKbfynbF+h3s6BOZ1m+Zb:J3m9s99L7wu1tsvz2UeQZ6IKWZ+doW+o
-
Gh0st RAT payload
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-