Behavioral task
behavioral1
Sample
b44f67a09fd121be7f021eb6833feef25508900dbeb785ceb1658f5da2671c4e.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b44f67a09fd121be7f021eb6833feef25508900dbeb785ceb1658f5da2671c4e.exe
Resource
win10v2004-20240426-en
General
-
Target
b44f67a09fd121be7f021eb6833feef25508900dbeb785ceb1658f5da2671c4e
-
Size
112KB
-
MD5
3993ec2509aebe9678fb273f4285a4fa
-
SHA1
ff286da0a1ef7f37ef2876fd0589f2f791c7cf57
-
SHA256
b44f67a09fd121be7f021eb6833feef25508900dbeb785ceb1658f5da2671c4e
-
SHA512
1ebafe04b05bfe368e1bcf38003eefe9c7b94ec7b9dafa63bb3ea40bdf07ee61824d6c3eb95671e916c4c01c0cbd4f53d86f7211055c018a650417e40afc3c3e
-
SSDEEP
3072:dF6F15h/zIn5S1aj+cU9C8R7gfw9aINej:GFjhLI5SG+FJ9aIA
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b44f67a09fd121be7f021eb6833feef25508900dbeb785ceb1658f5da2671c4e
Files
-
b44f67a09fd121be7f021eb6833feef25508900dbeb785ceb1658f5da2671c4e.exe windows:6 windows
Headers