General
-
Target
家庭日常菜素材版教程.exe
-
Size
2.0MB
-
Sample
230612-tdcdlade2s
-
MD5
54da74f54571d7727d575a46364d8cfe
-
SHA1
ba680e3d604fa326b55801bc2af4667a54afbe25
-
SHA256
3115da1c274f378293e579087aa2789d86c4de13f1db9f7a5b5468c55f101c79
-
SHA512
956eb68fbf6bb52f096c36d64ddcc371d5ec793f759c47d57518388e041eebbc8c21bbf32d399178b61a98de904daac6ac715e78a400a07f89324899144fffb6
-
SSDEEP
49152:NCAdw0gW0dvWmWMF1CS8dqBzMAPyTTHbuEtoisshLms4NV7ojUH1uQWdOGDktv2e:pyk0dvWmWMF1atTTCEtoisshLmHAUH1G
Static task
static1
Behavioral task
behavioral1
Sample
家庭日常菜素材版教程.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
家庭日常菜素材版教程.exe
-
Size
2.0MB
-
MD5
54da74f54571d7727d575a46364d8cfe
-
SHA1
ba680e3d604fa326b55801bc2af4667a54afbe25
-
SHA256
3115da1c274f378293e579087aa2789d86c4de13f1db9f7a5b5468c55f101c79
-
SHA512
956eb68fbf6bb52f096c36d64ddcc371d5ec793f759c47d57518388e041eebbc8c21bbf32d399178b61a98de904daac6ac715e78a400a07f89324899144fffb6
-
SSDEEP
49152:NCAdw0gW0dvWmWMF1CS8dqBzMAPyTTHbuEtoisshLms4NV7ojUH1uQWdOGDktv2e:pyk0dvWmWMF1atTTCEtoisshLmHAUH1G
-
Gh0st RAT payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-