General
-
Target
f5779045a4f8a31b8604d2c759ce710f217b99415ed57689c2b3f9946d8462bc
-
Size
1.0MB
-
Sample
240417-mphanacc23
-
MD5
b7f7eccc38bd334fd00d2e7d2f4b9c8f
-
SHA1
7e5f9d367a3848c0ee1db0078c27083da6e96291
-
SHA256
f5779045a4f8a31b8604d2c759ce710f217b99415ed57689c2b3f9946d8462bc
-
SHA512
f8fbfc08d633b0739326491c96189c7cef4652f5bd2a12130c142174033f3623e74e53be1343dc4184d281133d53f3d9f1b20516e9d9cdb9728982a3d593c339
-
SSDEEP
12288:6De4Fy/UQ0Vmu+X5IGasus/hP4ixLz1i7G8v4jKmU94XvOPE5XJl0TftFadFbBKi:6BA/rdIGaRaB4ixLqvehU94Xr5XjGar
Static task
static1
Behavioral task
behavioral1
Sample
f5779045a4f8a31b8604d2c759ce710f217b99415ed57689c2b3f9946d8462bc.exe
Resource
win7-20231129-en
Malware Config
Extracted
gh0strat
164.155.205.114
Targets
-
-
Target
f5779045a4f8a31b8604d2c759ce710f217b99415ed57689c2b3f9946d8462bc
-
Size
1.0MB
-
MD5
b7f7eccc38bd334fd00d2e7d2f4b9c8f
-
SHA1
7e5f9d367a3848c0ee1db0078c27083da6e96291
-
SHA256
f5779045a4f8a31b8604d2c759ce710f217b99415ed57689c2b3f9946d8462bc
-
SHA512
f8fbfc08d633b0739326491c96189c7cef4652f5bd2a12130c142174033f3623e74e53be1343dc4184d281133d53f3d9f1b20516e9d9cdb9728982a3d593c339
-
SSDEEP
12288:6De4Fy/UQ0Vmu+X5IGasus/hP4ixLz1i7G8v4jKmU94XvOPE5XJl0TftFadFbBKi:6BA/rdIGaRaB4ixLqvehU94Xr5XjGar
-
Gh0st RAT payload
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-