General
-
Target
f227423c346d9027d1e657253b83b2c3.bin
-
Size
746KB
-
Sample
230328-c4h6dsad8v
-
MD5
ebe23de5f69ecce16a578aab71210b74
-
SHA1
895483067318e1e9c5b6c5360c3db2911971493e
-
SHA256
9130df405ffcd5d59b0e4534f82078b9ab4fa61f8700a57c93b096b5dcf3cbd0
-
SHA512
4856f78cb2ebc3c56996587efe7a780d9a591efd8e782353d6fe0fa7fbdb9de0ba57f73366f7344feebeb1799e94ba84fb9769f6d4b97ad2a57cb20e16d78aa6
-
SSDEEP
12288:IpmPf212PeM7MqQrLaHq5qAtBNRPcLQA+jLiH/WzF/TwlSWFoCo2QKDd96JJzp:2o212GeMqm6qA+LRcL+juuBKSbCSKmzp
Behavioral task
behavioral1
Sample
6250f56eae18dbb7a98496675a44bcc1ddcb2aac03a707b10e9c1628bb956b29.exe
Resource
win7-20230220-en
Malware Config
Extracted
gh0strat
30.cmananan.com
Targets
-
-
Target
6250f56eae18dbb7a98496675a44bcc1ddcb2aac03a707b10e9c1628bb956b29.exe
-
Size
904KB
-
MD5
f227423c346d9027d1e657253b83b2c3
-
SHA1
ca7242b3247e19c0ab78950876a1d608fd108143
-
SHA256
6250f56eae18dbb7a98496675a44bcc1ddcb2aac03a707b10e9c1628bb956b29
-
SHA512
6c717a61374a91b9185e695c1d295b18b198c3854e5cfcb62f3b24f06360241e300456cfe64114e5395bb9e392d96caf5b4b22bbb019d456387cdea0b30d33d3
-
SSDEEP
12288:VORFtqmkNMULIUMhAbzzj/+qijhZHaL1Dg//6rIbeMOdIoHqL6V7DR:4zsbMhAbbmjn/aI6NCoHqe5
-
Gh0st RAT payload
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-