General
-
Target
61d17007d6a646ce0ead26e979368c9348645b9d48c04102e05e24fe99a41357
-
Size
3.0MB
-
Sample
230415-xsw84agg7x
-
MD5
ce9963dbb62bfb2009a546b069454c07
-
SHA1
5ff9b5c1d26fc1e06b52f831942c946cf8c07b4e
-
SHA256
61d17007d6a646ce0ead26e979368c9348645b9d48c04102e05e24fe99a41357
-
SHA512
2c34314616f4237c94f0ecd713870db27dc1af3c644f289d1b6ff9f9132042e5c6f71a474acae7558b38f0ad94e21e9702bc05162db871867e98958c6d2cf2fa
-
SSDEEP
24576:Wm0tr+fziN56mf8t2opc7idB46Ja6+6s30WiQo0WyV1VflilAhczT6Ja6+6s30Wk:WmLnm0ti7iLmx6M8A1VflijzLx6Mk
Behavioral task
behavioral1
Sample
61d17007d6a646ce0ead26e979368c9348645b9d48c04102e05e24fe99a41357.exe
Resource
win7-20230220-en
Malware Config
Extracted
gh0strat
shaoshuai3.top
Targets
-
-
Target
61d17007d6a646ce0ead26e979368c9348645b9d48c04102e05e24fe99a41357
-
Size
3.0MB
-
MD5
ce9963dbb62bfb2009a546b069454c07
-
SHA1
5ff9b5c1d26fc1e06b52f831942c946cf8c07b4e
-
SHA256
61d17007d6a646ce0ead26e979368c9348645b9d48c04102e05e24fe99a41357
-
SHA512
2c34314616f4237c94f0ecd713870db27dc1af3c644f289d1b6ff9f9132042e5c6f71a474acae7558b38f0ad94e21e9702bc05162db871867e98958c6d2cf2fa
-
SSDEEP
24576:Wm0tr+fziN56mf8t2opc7idB46Ja6+6s30WiQo0WyV1VflilAhczT6Ja6+6s30Wk:WmLnm0ti7iLmx6M8A1VflijzLx6Mk
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-