General
-
Target
WindowsProgram.exe.v
-
Size
27.4MB
-
Sample
240905-kc1v5axdmf
-
MD5
68afd62d13c6e7eef178dbd802f4346b
-
SHA1
563b6732f4ef8d48057876edb389877495614c11
-
SHA256
b1863a43a5f1688b31501200fa4adaeea3b25608e29dad06865888c12a3349a4
-
SHA512
04960cae9dad7835b481e5086b01befd0ee7bf3042d1dde7220c5f446364fcbe0343b09010509be2a4bccb4cdda733aa6163dfed1c54bc1a7ab7a74b12c27b04
-
SSDEEP
786432:fU+DyjTA2W3bjJr/li3b8CNYWyxMVThRJe0BFo:9+K3fJr/I3b8Cq1xMto0Bm
Static task
static1
Behavioral task
behavioral1
Sample
WindowsProgram.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
WindowsProgram.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
WindowsProgram.exe.v
-
Size
27.4MB
-
MD5
68afd62d13c6e7eef178dbd802f4346b
-
SHA1
563b6732f4ef8d48057876edb389877495614c11
-
SHA256
b1863a43a5f1688b31501200fa4adaeea3b25608e29dad06865888c12a3349a4
-
SHA512
04960cae9dad7835b481e5086b01befd0ee7bf3042d1dde7220c5f446364fcbe0343b09010509be2a4bccb4cdda733aa6163dfed1c54bc1a7ab7a74b12c27b04
-
SSDEEP
786432:fU+DyjTA2W3bjJr/li3b8CNYWyxMVThRJe0BFo:9+K3fJr/I3b8Cq1xMto0Bm
-
Gh0st RAT payload
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-