General
-
Target
1edbf656af8dd8266eb745423abf553cf387a70259d105c5a1a0175d109ca457
-
Size
388KB
-
Sample
230827-vn982sdg21
-
MD5
f734be5980f5b87a76f2a1ebce02023d
-
SHA1
7613f401bb49f0519c4dc216d0024e4032466c4c
-
SHA256
1edbf656af8dd8266eb745423abf553cf387a70259d105c5a1a0175d109ca457
-
SHA512
82bdd87cb12543567a314f44edee995c782506edd6212f172bbb3100a87cc9f4f7f22efdae6b8209f93c07db304a2edd14160c83875a029f2d64807a4b84aaf8
-
SSDEEP
3072:ecK/yLrQbWaR5Qax8c/YtVpBNh7//g9WEvn8p9o1LQU9S1ZfKOYM1AY:eXyLEbWaR5CcEpB/IHao2EUYMV
Static task
static1
Behavioral task
behavioral1
Sample
1edbf656af8dd8266eb745423abf553cf387a70259d105c5a1a0175d109ca457.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1edbf656af8dd8266eb745423abf553cf387a70259d105c5a1a0175d109ca457.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
gh0strat
43.138.104.135
Targets
-
-
Target
1edbf656af8dd8266eb745423abf553cf387a70259d105c5a1a0175d109ca457
-
Size
388KB
-
MD5
f734be5980f5b87a76f2a1ebce02023d
-
SHA1
7613f401bb49f0519c4dc216d0024e4032466c4c
-
SHA256
1edbf656af8dd8266eb745423abf553cf387a70259d105c5a1a0175d109ca457
-
SHA512
82bdd87cb12543567a314f44edee995c782506edd6212f172bbb3100a87cc9f4f7f22efdae6b8209f93c07db304a2edd14160c83875a029f2d64807a4b84aaf8
-
SSDEEP
3072:ecK/yLrQbWaR5Qax8c/YtVpBNh7//g9WEvn8p9o1LQU9S1ZfKOYM1AY:eXyLEbWaR5CcEpB/IHao2EUYMV
Score10/10-
Gh0st RAT payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-