Behavioral task
behavioral1
Sample
c4b9587c52eaca7e98b465b0bd4711559f3d2547660f161560e1c987057984f6.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
c4b9587c52eaca7e98b465b0bd4711559f3d2547660f161560e1c987057984f6.exe
Resource
win10v2004-20240508-en
General
-
Target
c4b9587c52eaca7e98b465b0bd4711559f3d2547660f161560e1c987057984f6
-
Size
112KB
-
MD5
a38b94762ab8c6972f3862d2eaa418ca
-
SHA1
7fa43dc686aef237664234e78fab03e63ad59640
-
SHA256
c4b9587c52eaca7e98b465b0bd4711559f3d2547660f161560e1c987057984f6
-
SHA512
e22a2dde8100bd55c3a7a826d627d38876c44972d0c6221a8e4a592b3d07b518129ea4236cd3321eba7f765faa98737f66d86f212dffe7782e583091a438230f
-
SSDEEP
3072:5F6F15h/zIn5S1aj+cU9C86Fgjw9aINej:qFjhLI5SG+F29aIA
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c4b9587c52eaca7e98b465b0bd4711559f3d2547660f161560e1c987057984f6
Files
-
c4b9587c52eaca7e98b465b0bd4711559f3d2547660f161560e1c987057984f6.exe windows:6 windows
Headers