Analysis
-
max time kernel
154s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2023, 13:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
acd2373c56523db76e39f0fef2127fd4970fe87efa5bfa565077a3c0c7e0e470.exe
Resource
win7-20230712-en
5 signatures
150 seconds
General
-
Target
acd2373c56523db76e39f0fef2127fd4970fe87efa5bfa565077a3c0c7e0e470.exe
-
Size
1.3MB
-
MD5
ef9234ef604974d53c9376af13dd59d0
-
SHA1
9bd3a278443d17657f347dde6741ba1d94e1d0d6
-
SHA256
acd2373c56523db76e39f0fef2127fd4970fe87efa5bfa565077a3c0c7e0e470
-
SHA512
c9362e75764f3b26b7f3c9687fa3bb59b209aec042436ea8579b7abe885b1cfbc61195c77c7b1ab0797968f6572e5117543345a71fb361d7c14172069b767b8e
-
SSDEEP
24576:9OyHutimZ9VSly2hVvHW6qMnSbTBBhBMN3Fyzhyz:wHPkVOBTK
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3308-0-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3308-0-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 3308 acd2373c56523db76e39f0fef2127fd4970fe87efa5bfa565077a3c0c7e0e470.exe Token: SeIncBasePriorityPrivilege 3308 acd2373c56523db76e39f0fef2127fd4970fe87efa5bfa565077a3c0c7e0e470.exe Token: 33 3308 acd2373c56523db76e39f0fef2127fd4970fe87efa5bfa565077a3c0c7e0e470.exe Token: SeIncBasePriorityPrivilege 3308 acd2373c56523db76e39f0fef2127fd4970fe87efa5bfa565077a3c0c7e0e470.exe