General
-
Target
Load.zip
-
Size
1.2MB
-
Sample
231103-dvz8zsbd3t
-
MD5
48add6107d9d7f27023df514636dba42
-
SHA1
e0b267bb3720b63a291ba426777839e886eac785
-
SHA256
5a29690b42487507b0450556c55276c446da7ca41c72861e57b5685869d24cd6
-
SHA512
880bab6051d747a6f94262739a46764511414e43fc8ddbd6f07e246c12af53cfc7199c09b7a68f642a8654092c11a63ccc8f6c41741ca29135caf4b022358b11
-
SSDEEP
24576:iTODPctPOBximjSoqBjfOpabJF1Mtkr6lciKqQtBn57u6eVSQWQPZ2DqUAR:iT9mamTqBjfQabJF1FNL57uJdBPZ2ePR
Static task
static1
Behavioral task
behavioral1
Sample
ML7R9U7.exe
Resource
win7-20231023-en
Malware Config
Extracted
gh0strat
27.124.10.162
Targets
-
-
Target
ML7R9U7.exe
-
Size
359KB
-
MD5
a37556c8cfd7eaba495a318a0de59466
-
SHA1
07707cba7364e130f35eddbcab7702db44e7e671
-
SHA256
08e9d8d7b108683314e5fad199d52b868713807697704f08ddc4b825553cca20
-
SHA512
be38b134da1675a51585787433b8ec98eee5940db103eac5e2e851c65e6050f45b943aa8fe76393f593f7de1a4de0a636327c3f78c3d7a056308fa3a54c08d23
-
SSDEEP
6144:2ZpuZnVB3/nPwArobrJEoXG81WAheOBO77NsHJDi1tPYP6lLaYpPqQ5aSAwz07Au:2ZM13/nPw6ovJE2G8IAheOA7JsH1KtPm
-
Gh0st RAT payload
-
Modifies RDP port number used by Windows
-