Behavioral task
behavioral1
Sample
92d1eada419273a87ee66170826f94aab7af63a521bdfc20273620a5bb9e012b.exe
Resource
win7-20240221-en
General
-
Target
92d1eada419273a87ee66170826f94aab7af63a521bdfc20273620a5bb9e012b.exe
-
Size
208KB
-
MD5
260ffaf122376ce7029f7ea98fe0b721
-
SHA1
aab03027fbc29f0d1151480d388253914e985cff
-
SHA256
92d1eada419273a87ee66170826f94aab7af63a521bdfc20273620a5bb9e012b
-
SHA512
8656b08cf77e1ab728a9e5f822e017bca74ea67231f9ad700d40b91ae6c17a7a218c84b5f0b25e8b5c9bd9ea0b253120e0f51ce786a152618db4c7ac45b9e036
-
SSDEEP
3072:PTeTY1km5WBqwP3gsxQ/Xz7iasfsyC/hX6sxv3pAEAXPWegryrLr:PiTtiWBvOL7t5J5Zp3qpXPWy
Malware Config
Signatures
-
Detects executables embedding registry key / value combination manipulating RDP / Terminal Services 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_RegKeyComb_RDP -
Detects file containing reversed ASEP Autorun registry keys 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse -
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 92d1eada419273a87ee66170826f94aab7af63a521bdfc20273620a5bb9e012b.exe
Files
-
92d1eada419273a87ee66170826f94aab7af63a521bdfc20273620a5bb9e012b.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
NewSec Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
NewSec Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE