General
-
Target
dd63a0473c5ddf211ca7bb31ae868dfa8a03d4056dd84c9b813b219b33cdc5c7
-
Size
1.4MB
-
Sample
230813-meyjwsda7w
-
MD5
eb6fbbe18d63aef164979766989e5f27
-
SHA1
5acafcadd1f1ba55731f9a02bcf152bb697e4ad1
-
SHA256
dd63a0473c5ddf211ca7bb31ae868dfa8a03d4056dd84c9b813b219b33cdc5c7
-
SHA512
4a1e1932e4bab4510a4c3ac0c0c14c94c8f00792c35d2b4f1e4a25eaa8c37bc106ef400cf87a8f4969e8705450687a73ba16539e1578d961fbaab480cc258b6b
-
SSDEEP
24576:F39WkOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:59qHPkVOBTK
Static task
static1
Behavioral task
behavioral1
Sample
dd63a0473c5ddf211ca7bb31ae868dfa8a03d4056dd84c9b813b219b33cdc5c7.exe
Resource
win7-20230712-en
Malware Config
Targets
-
-
Target
dd63a0473c5ddf211ca7bb31ae868dfa8a03d4056dd84c9b813b219b33cdc5c7
-
Size
1.4MB
-
MD5
eb6fbbe18d63aef164979766989e5f27
-
SHA1
5acafcadd1f1ba55731f9a02bcf152bb697e4ad1
-
SHA256
dd63a0473c5ddf211ca7bb31ae868dfa8a03d4056dd84c9b813b219b33cdc5c7
-
SHA512
4a1e1932e4bab4510a4c3ac0c0c14c94c8f00792c35d2b4f1e4a25eaa8c37bc106ef400cf87a8f4969e8705450687a73ba16539e1578d961fbaab480cc258b6b
-
SSDEEP
24576:F39WkOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:59qHPkVOBTK
-
Gh0st RAT payload
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-