Behavioral task
behavioral1
Sample
605013bb0dd29e50a825f841b668adf6d62ceaf5f95808bc0b48ec814fe751f3.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
605013bb0dd29e50a825f841b668adf6d62ceaf5f95808bc0b48ec814fe751f3.exe
Resource
win10v2004-20240611-en
General
-
Target
605013bb0dd29e50a825f841b668adf6d62ceaf5f95808bc0b48ec814fe751f3
-
Size
112KB
-
MD5
21be9bf48f62c18012b883cf6a5e8225
-
SHA1
54520c9577b528705e28e8ec22401652550b4376
-
SHA256
605013bb0dd29e50a825f841b668adf6d62ceaf5f95808bc0b48ec814fe751f3
-
SHA512
457cb38356e8aeeb01316e9d73b4b56a28976289ae093f4b1d7b460a0144ab8bd95ab35f05a1a0c231c59320a7d0494b2899db3c1f0106465ed83f2a18cbd0bd
-
SSDEEP
3072:TF6F15h/zIn5S1aj+cU9C8Jsgsw9aINej:cFjhLI5SG+FL9aIA
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 605013bb0dd29e50a825f841b668adf6d62ceaf5f95808bc0b48ec814fe751f3
Files
-
605013bb0dd29e50a825f841b668adf6d62ceaf5f95808bc0b48ec814fe751f3.exe windows:6 windows
Headers