General
-
Target
a3ce3b36b3aa34f6f757fd9be8c3f76beffdb31cef29d2f02c73bfccedb1ef4e
-
Size
1.6MB
-
Sample
230830-z1r1fsad2y
-
MD5
c3a47a83352eacf5401c1aaaa680c979
-
SHA1
ee3d5d13ca47e79954df9f3711add50b6baefd31
-
SHA256
a3ce3b36b3aa34f6f757fd9be8c3f76beffdb31cef29d2f02c73bfccedb1ef4e
-
SHA512
6993f280b8cb92101e09d8eb2f68cfb64c648b24b28d83a5a84910978169ecaee2795368ae49730d5cd31fe273ecae041cfcb61352886d34a33a0e611515bf0a
-
SSDEEP
24576:IXAfqZgJ9etkaDBAecKVN7eVlND8tbw8QEDmFYYr4RWGqEb5kGzacf3gH:IQf2g5aDUHVlNDf2muYcRHPv2430
Static task
static1
Behavioral task
behavioral1
Sample
a3ce3b36b3aa34f6f757fd9be8c3f76beffdb31cef29d2f02c73bfccedb1ef4e.exe
Resource
win7-20230712-en
Malware Config
Targets
-
-
Target
a3ce3b36b3aa34f6f757fd9be8c3f76beffdb31cef29d2f02c73bfccedb1ef4e
-
Size
1.6MB
-
MD5
c3a47a83352eacf5401c1aaaa680c979
-
SHA1
ee3d5d13ca47e79954df9f3711add50b6baefd31
-
SHA256
a3ce3b36b3aa34f6f757fd9be8c3f76beffdb31cef29d2f02c73bfccedb1ef4e
-
SHA512
6993f280b8cb92101e09d8eb2f68cfb64c648b24b28d83a5a84910978169ecaee2795368ae49730d5cd31fe273ecae041cfcb61352886d34a33a0e611515bf0a
-
SSDEEP
24576:IXAfqZgJ9etkaDBAecKVN7eVlND8tbw8QEDmFYYr4RWGqEb5kGzacf3gH:IQf2g5aDUHVlNDf2muYcRHPv2430
-
Gh0st RAT payload
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-