Behavioral task
behavioral1
Sample
9ca1c73b5642124af47b4ece567527daac6f799d48c72952f3716d94d5ee68d4.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9ca1c73b5642124af47b4ece567527daac6f799d48c72952f3716d94d5ee68d4.exe
Resource
win10v2004-20230703-en
General
-
Target
9ca1c73b5642124af47b4ece567527daac6f799d48c72952f3716d94d5ee68d4
-
Size
112KB
-
MD5
2afff7ce8bb26e27334dc894999deb3a
-
SHA1
b67a003211a25688e0183ff5b5d2667f9b7f33f7
-
SHA256
9ca1c73b5642124af47b4ece567527daac6f799d48c72952f3716d94d5ee68d4
-
SHA512
1d0497d0cfa1ba624f64125ab6e73c70f3faa25f8ef815512582d53d7306a7649e6ec992aac2844504a67acf66a48e54b3551ac7271a34b974210f5c2921e63f
-
SSDEEP
3072:lF6F15h/zIn5S1aj+cU9C86fgXw9aINej:+FjhLI5SG+FI9aIA
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9ca1c73b5642124af47b4ece567527daac6f799d48c72952f3716d94d5ee68d4
Files
-
9ca1c73b5642124af47b4ece567527daac6f799d48c72952f3716d94d5ee68d4.exe windows