General
-
Target
ExeFile (119).exe
-
Size
32KB
-
Sample
240820-rf53kswbqg
-
MD5
89c3536c954b7953413bb228833adaff
-
SHA1
74cba0223e941f83037f0b497c6e0e6e205059d1
-
SHA256
cad447f67f2548859a6c86a141bb1a2105417fdb9390d73424e67921c83271db
-
SHA512
9f3a4ac749cfebe0ae065a52943933833c6462de814e74b37c7a51404db6f893a46a5458adc1f55dfd0b0519a635429867eec7f7cc1f7af1d4dfdca844f4bd92
-
SSDEEP
768:Uw/iOWTK3JWhOM/qZh7UJGcZ/yKQcnbcuyD7U7s9:7QK52fqZSIAK0nouy87s9
Behavioral task
behavioral1
Sample
ExeFile (119).exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ExeFile (119).exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
gh0strat
p.f2pool.info
Targets
-
-
Target
ExeFile (119).exe
-
Size
32KB
-
MD5
89c3536c954b7953413bb228833adaff
-
SHA1
74cba0223e941f83037f0b497c6e0e6e205059d1
-
SHA256
cad447f67f2548859a6c86a141bb1a2105417fdb9390d73424e67921c83271db
-
SHA512
9f3a4ac749cfebe0ae065a52943933833c6462de814e74b37c7a51404db6f893a46a5458adc1f55dfd0b0519a635429867eec7f7cc1f7af1d4dfdca844f4bd92
-
SSDEEP
768:Uw/iOWTK3JWhOM/qZh7UJGcZ/yKQcnbcuyD7U7s9:7QK52fqZSIAK0nouy87s9
Score10/10-
Gh0st RAT payload
-
Server Software Component: Terminal Services DLL
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Creates a Windows Service
-
Drops file in System32 directory
-