Behavioral task
behavioral1
Sample
6c42189559eef7fbd5f6a79bbaf0ca4ca24bbb00c0e5c1806f6739518c355d37.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6c42189559eef7fbd5f6a79bbaf0ca4ca24bbb00c0e5c1806f6739518c355d37.exe
Resource
win10v2004-20230824-en
General
-
Target
6c42189559eef7fbd5f6a79bbaf0ca4ca24bbb00c0e5c1806f6739518c355d37
-
Size
112KB
-
MD5
fbed05173ae855d4fa9e8a1e7c0f2901
-
SHA1
31fe43be1a36ccdbaaef2da65243fdc06c52ea3e
-
SHA256
6c42189559eef7fbd5f6a79bbaf0ca4ca24bbb00c0e5c1806f6739518c355d37
-
SHA512
e4c893770d170e5138a859a0348170ad00a6cbdc0b2fd441dcc05201343dfbd6ba190e257d4b609f52869dc8538916637366f85d326f0bede533ce3126383edd
-
SSDEEP
3072:eF6F15h/zIn5S1aj+cU9C8Bygiw9aINej:9FjhLI5SG+FT9aIA
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6c42189559eef7fbd5f6a79bbaf0ca4ca24bbb00c0e5c1806f6739518c355d37
Files
-
6c42189559eef7fbd5f6a79bbaf0ca4ca24bbb00c0e5c1806f6739518c355d37.exe windows