General
-
Target
FK.zip
-
Size
2.7MB
-
Sample
231105-sjalhshg28
-
MD5
802e065400ebd05916440bc167566373
-
SHA1
97e4e85cee844cbfded3d51afe20f24fe50c9ea7
-
SHA256
54c27525fac214f62a15b08cc3707d4ab248448d7a78661110db829496297d1d
-
SHA512
ec705a35622a987a70a98b57f0848022f147566352406e8157eeef5a6746d60f2e777f200cbe2791210708949c11b638c3aa82de7ac0c7440f5dcf29cf960816
-
SSDEEP
49152:dggxw0YknK4pgKxK8/6l/mcRS4xdR2hOq0qXOFovFwjpkOA5miaHRdNtE:dgW8GKLKb4RSEkF0qXOKShUOHRja
Static task
static1
Behavioral task
behavioral1
Sample
11L3O67.exe
Resource
win7-20231025-en
Malware Config
Extracted
gh0strat
27.124.10.162
Targets
-
-
Target
11L3O67.exe
-
Size
3.3MB
-
MD5
55676704ea30ec80782a6fe129ecd07a
-
SHA1
b2935565cc449db1ceb78618f06b145eed7b129f
-
SHA256
add99c5e79d3b6736133c2d0336c8386b7c68ce99839b83208ba3b832e5627ff
-
SHA512
3ceead21394022fd33cbfec8332a67791223d52189d7b383c714662fcb8d2f7354a3070a80219e49840f793402a7726b003bd5a1a9aa77e014c26a6e9c5fcd9c
-
SSDEEP
98304:ZGwl5CrmnosDeIp8ZoctqhBtky7zZ+iDCRDtVCQ4:ZXl5HnoipqkhBtky7zZeRDtZ4
-
Gh0st RAT payload
-
Modifies RDP port number used by Windows
-