General
-
Target
tmp
-
Size
145KB
-
Sample
240420-nj4r5sfd65
-
MD5
d2322ff64b70bc3a1e75ce94d9fb827d
-
SHA1
d0be1efa43f933c14170875188dcb13bbb5fa0ea
-
SHA256
4b4c1b7cf82a7f3264ac3455c0f08c268fcc5028a54d8c467fe8b331209132cb
-
SHA512
4595c5c87c8b8884d221d61f3fa0a488c79eb4d318b18fdfb4b971532d26828300f8a37112409123301b9851a7334688f6d82cd3a8335c5229e4c3b7c9996ad2
-
SSDEEP
3072:7+7a/40Udj30DCwHUXILXu6fJuhUYQCcobx5mLiNCqsZ4eQIosFi0yA8X:K7a/0dj30DzbbNR0UYUwxP0qsZ4e7os6
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
tmp
-
Size
145KB
-
MD5
d2322ff64b70bc3a1e75ce94d9fb827d
-
SHA1
d0be1efa43f933c14170875188dcb13bbb5fa0ea
-
SHA256
4b4c1b7cf82a7f3264ac3455c0f08c268fcc5028a54d8c467fe8b331209132cb
-
SHA512
4595c5c87c8b8884d221d61f3fa0a488c79eb4d318b18fdfb4b971532d26828300f8a37112409123301b9851a7334688f6d82cd3a8335c5229e4c3b7c9996ad2
-
SSDEEP
3072:7+7a/40Udj30DCwHUXILXu6fJuhUYQCcobx5mLiNCqsZ4eQIosFi0yA8X:K7a/0dj30DzbbNR0UYUwxP0qsZ4e7os6
-
Gh0st RAT payload
-
Blocklisted process makes network request
-
Deletes itself
-
Loads dropped DLL
-