Behavioral task
behavioral1
Sample
4e2a8fd479408aa8c82f16783fff6450929d6c0868df9ab3fc6725c53bf23b3c.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
4e2a8fd479408aa8c82f16783fff6450929d6c0868df9ab3fc6725c53bf23b3c.exe
Resource
win10v2004-20240508-en
General
-
Target
4e2a8fd479408aa8c82f16783fff6450929d6c0868df9ab3fc6725c53bf23b3c
-
Size
112KB
-
MD5
b2562424b1157691a72303a0751ea2c9
-
SHA1
2c265bc2dbb9a06e9f4eace473b0a728b8394817
-
SHA256
4e2a8fd479408aa8c82f16783fff6450929d6c0868df9ab3fc6725c53bf23b3c
-
SHA512
dfdb9b9c6bc517bbb7226e175450c1d2a45a7c179e0bfc9d79156f597ad7d3a8b5efc795444f12f52bcca5d1b6dcacbb285ea45f781fab670d617d05be68d969
-
SSDEEP
3072:nF6F15h/zIn5S1aj+cU9C8jjg1w9aINej:YFjhLI5SG+F19aIA
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4e2a8fd479408aa8c82f16783fff6450929d6c0868df9ab3fc6725c53bf23b3c
Files
-
4e2a8fd479408aa8c82f16783fff6450929d6c0868df9ab3fc6725c53bf23b3c.exe windows:6 windows
Headers