General
-
Target
Signed-语言包.7z
-
Size
86.2MB
-
Sample
230611-r7zpwahc72
-
MD5
456b29e1d430908e7c1427f39545ec33
-
SHA1
4a15ee78d1d522009586721d0889b1c842a96ecd
-
SHA256
6cc4412124674537ce946fe4266b4750efbbe237c3ed6f3e62287c5f33f3cdd1
-
SHA512
4d2614db80a495b38abcee5aca9b0758860abee5672405b683dd0bee29ec4508cb9ddb8b19690e5301f1e57a68e3ab9aa5d933a369dbdca7c8a79de2163692dd
-
SSDEEP
1572864:rB1ctpHw4qmIY85WznLGoPDAUAwf/G1NfjTWem8Ywi9MnA6ux/I9E:d1Sq4qa85MnLGobAUTf/C9KeV9i3x/IC
Behavioral task
behavioral1
Sample
点击运行转换中文版3.exe
Resource
win7-20230220-en
Malware Config
Extracted
gh0strat
kekn.asselst.com
Targets
-
-
Target
点击运行转换中文版3.exe
-
Size
101.3MB
-
MD5
8508b8d8c7f18a83c3273962015c4801
-
SHA1
376250d1eff8073cdd8a675e0611f3cae24f5197
-
SHA256
0bd10f7f1910e9b5d5c6dd6bffbb479ea636d86cc4d99a5cf24640cf9b83cdac
-
SHA512
26b84e4463d1170a76528c9719366a7205c62370ff4f9e191b47f35f09b45db66753a3943e8cba7eb7fb257ff8ac44282468f5da3ea18523e57e2aa715e90a5b
-
SSDEEP
3145728:G7kwwuE7sMxfyADRgk1I/uQ9kodzNI3b7zN9:l7sAJDFMdkcNqLN9
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Modifies RDP port number used by Windows
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-