Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2023, 15:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
97a1cd49fa99eacd97ab69dd273b85113646d4ce6ea2cecaae131bac50d3751f.exe
Resource
win7-20230831-en
6 signatures
150 seconds
General
-
Target
97a1cd49fa99eacd97ab69dd273b85113646d4ce6ea2cecaae131bac50d3751f.exe
-
Size
370KB
-
MD5
9e2ebe64684fdb7e89cf70337987e010
-
SHA1
e93512b2959acbc49ce8ceacf1f47cc1e754e2b1
-
SHA256
97a1cd49fa99eacd97ab69dd273b85113646d4ce6ea2cecaae131bac50d3751f
-
SHA512
269ca4c90964ed1be3fc14d1113ae6b213ae45d7fb78c9dd1944fb96420e01b0e0b9fbc38175fdffcbdce52eca8ae23565b63a38834420dd019ffb8a465fcf2c
-
SSDEEP
6144:q46iVZNa86sqSp5YEi68dBjYkOhDgAf3AQH0Qsay50v76GqYU20C:q45KST2vYkOhDX0Zz5S7689
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3296-4-0x0000000010000000-0x00000000101A8000-memory.dmp purplefox_rootkit behavioral2/memory/3296-2-0x0000000010000000-0x00000000101A8000-memory.dmp purplefox_rootkit behavioral2/memory/3296-6-0x0000000010000000-0x00000000101A8000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/memory/3296-3-0x0000000010000000-0x00000000101A8000-memory.dmp family_gh0strat behavioral2/memory/3296-4-0x0000000010000000-0x00000000101A8000-memory.dmp family_gh0strat behavioral2/memory/3296-2-0x0000000010000000-0x00000000101A8000-memory.dmp family_gh0strat behavioral2/memory/3296-6-0x0000000010000000-0x00000000101A8000-memory.dmp family_gh0strat -
resource yara_rule behavioral2/memory/3296-0-0x0000000010000000-0x00000000101A8000-memory.dmp upx behavioral2/memory/3296-3-0x0000000010000000-0x00000000101A8000-memory.dmp upx behavioral2/memory/3296-4-0x0000000010000000-0x00000000101A8000-memory.dmp upx behavioral2/memory/3296-2-0x0000000010000000-0x00000000101A8000-memory.dmp upx behavioral2/memory/3296-6-0x0000000010000000-0x00000000101A8000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\.exe 97a1cd49fa99eacd97ab69dd273b85113646d4ce6ea2cecaae131bac50d3751f.exe File created C:\Windows\SysWOW64\.exe 97a1cd49fa99eacd97ab69dd273b85113646d4ce6ea2cecaae131bac50d3751f.exe