General
-
Target
57e4f58a35392a719539b728898663e59ad005253dbd6ece6ec8e1da26db12b1
-
Size
450KB
-
Sample
240104-pl2w1aaae4
-
MD5
62186633bbabdfa2146dfb23b90bf2fd
-
SHA1
cd3f6566bf73dd39ec99bc9aa13be2f8a3c71312
-
SHA256
57e4f58a35392a719539b728898663e59ad005253dbd6ece6ec8e1da26db12b1
-
SHA512
82a064d174742285ad0eba86f2ffced4f4450f72f9d9068562d6b9ca8e43dad740caa54bc41f3c06389fb12067868ca9d1eac746be39c0c8108b57c960ac9097
-
SSDEEP
12288:566Df6Of5UnKIOb9/G7Jiab96YnsDbbY0:qn6b9Gtiab96HDP
Behavioral task
behavioral1
Sample
57e4f58a35392a719539b728898663e59ad005253dbd6ece6ec8e1da26db12b1.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
57e4f58a35392a719539b728898663e59ad005253dbd6ece6ec8e1da26db12b1.dll
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
57e4f58a35392a719539b728898663e59ad005253dbd6ece6ec8e1da26db12b1
-
Size
450KB
-
MD5
62186633bbabdfa2146dfb23b90bf2fd
-
SHA1
cd3f6566bf73dd39ec99bc9aa13be2f8a3c71312
-
SHA256
57e4f58a35392a719539b728898663e59ad005253dbd6ece6ec8e1da26db12b1
-
SHA512
82a064d174742285ad0eba86f2ffced4f4450f72f9d9068562d6b9ca8e43dad740caa54bc41f3c06389fb12067868ca9d1eac746be39c0c8108b57c960ac9097
-
SSDEEP
12288:566Df6Of5UnKIOb9/G7Jiab96YnsDbbY0:qn6b9Gtiab96HDP
-
Gh0st RAT payload
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-