Behavioral task
behavioral1
Sample
5af0ccdd6c1359f834831ff85813f67ea026bd632e9fd66d61beff0f86bf7232.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5af0ccdd6c1359f834831ff85813f67ea026bd632e9fd66d61beff0f86bf7232.exe
Resource
win10v2004-20240508-en
General
-
Target
5af0ccdd6c1359f834831ff85813f67ea026bd632e9fd66d61beff0f86bf7232
-
Size
112KB
-
MD5
a6a31bfbccdf1afc82154cde523a00cc
-
SHA1
7f0f7a820ef0b38bdd7d54879a98caecd96b944e
-
SHA256
5af0ccdd6c1359f834831ff85813f67ea026bd632e9fd66d61beff0f86bf7232
-
SHA512
b884710f9a6bddd38a4f50df8420e7513b3ff6824b779593300a62c9de080466cde8d471b199a5062218b4f15b8619df0df3359c88e3bef41228f59cf75ebf2e
-
SSDEEP
3072:2F6F15h/zIn5S1aj+cU9C8wagKw9aINej:FFjhLI5SG+F89aIA
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5af0ccdd6c1359f834831ff85813f67ea026bd632e9fd66d61beff0f86bf7232
Files
-
5af0ccdd6c1359f834831ff85813f67ea026bd632e9fd66d61beff0f86bf7232.exe windows:6 windows
Headers