General
-
Target
ExeFile (118).exe
-
Size
32KB
-
Sample
240820-rf53kswbqf
-
MD5
063eac49dce280735483eda62ccfd437
-
SHA1
7bc157cd1d16e61497c6ccf0db0c5fc9a103c7b7
-
SHA256
a045dcaf7519a45b16068cad76467bd90b552571200c930ea4d4880416c5f39b
-
SHA512
088346741d9076da6456504a37cc8cca01a0222cb641015254bd7924c5c089f9b9394037dc6f0c8796fbe9b81d35df9486c92d3b8f9f63c43f83115329a8884f
-
SSDEEP
768:Fw/iOWTK3JWhOM/qZh7UJGcZ/81uwO+0pzx2onbcuyD7U7s9:mQK52fqZSIAlx2onouy87s9
Behavioral task
behavioral1
Sample
ExeFile (118).exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ExeFile (118).exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
gh0strat
p.f2pool.info
Targets
-
-
Target
ExeFile (118).exe
-
Size
32KB
-
MD5
063eac49dce280735483eda62ccfd437
-
SHA1
7bc157cd1d16e61497c6ccf0db0c5fc9a103c7b7
-
SHA256
a045dcaf7519a45b16068cad76467bd90b552571200c930ea4d4880416c5f39b
-
SHA512
088346741d9076da6456504a37cc8cca01a0222cb641015254bd7924c5c089f9b9394037dc6f0c8796fbe9b81d35df9486c92d3b8f9f63c43f83115329a8884f
-
SSDEEP
768:Fw/iOWTK3JWhOM/qZh7UJGcZ/81uwO+0pzx2onbcuyD7U7s9:mQK52fqZSIAlx2onouy87s9
Score10/10-
Gh0st RAT payload
-
Server Software Component: Terminal Services DLL
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Creates a Windows Service
-
Drops file in System32 directory
-