General
-
Target
7aafc60290b1ccec06c76fb8d06d7a7b.exe
-
Size
884KB
-
Sample
230329-xlck4she52
-
MD5
7aafc60290b1ccec06c76fb8d06d7a7b
-
SHA1
260e5cdeba05c36d5edcf0d0dc280719eacfd611
-
SHA256
fea1933830a69ff3636b0309df6d91b7b425c2d6577ca584629204ae356ab524
-
SHA512
d82a97846f4b5af3612766c07c9327968816ba8fbca8e45f1cebd0d170d0e48e96f1a0f91456e95318e1bc6bcaf57a6a46eefcd010a34a1a6b67933336343692
-
SSDEEP
12288:UMrAn/yZdtZveNAGiVJvfGmuSjOUe6lF7GEfyu9btUi6kvJstvNAK3hx:xw/yZHZveNGJGfMFe6baeUPkxstvNAO
Behavioral task
behavioral1
Sample
7aafc60290b1ccec06c76fb8d06d7a7b.exe
Resource
win7-20230220-en
Malware Config
Extracted
gh0strat
30.cmananan.com
Targets
-
-
Target
7aafc60290b1ccec06c76fb8d06d7a7b.exe
-
Size
884KB
-
MD5
7aafc60290b1ccec06c76fb8d06d7a7b
-
SHA1
260e5cdeba05c36d5edcf0d0dc280719eacfd611
-
SHA256
fea1933830a69ff3636b0309df6d91b7b425c2d6577ca584629204ae356ab524
-
SHA512
d82a97846f4b5af3612766c07c9327968816ba8fbca8e45f1cebd0d170d0e48e96f1a0f91456e95318e1bc6bcaf57a6a46eefcd010a34a1a6b67933336343692
-
SSDEEP
12288:UMrAn/yZdtZveNAGiVJvfGmuSjOUe6lF7GEfyu9btUi6kvJstvNAK3hx:xw/yZHZveNGJGfMFe6baeUPkxstvNAO
-
Gh0st RAT payload
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-