Behavioral task
behavioral1
Sample
4bc870c60b0782c25db4a7384637a892a12a0f2557c12475092f61824ad9a2aa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4bc870c60b0782c25db4a7384637a892a12a0f2557c12475092f61824ad9a2aa.exe
Resource
win10v2004-20240802-en
General
-
Target
4bc870c60b0782c25db4a7384637a892a12a0f2557c12475092f61824ad9a2aa
-
Size
109KB
-
MD5
3fe0bdf05868ab2d328427dad60c16fc
-
SHA1
ff84974b523bcac75943a72ed915de991c0d4c73
-
SHA256
4bc870c60b0782c25db4a7384637a892a12a0f2557c12475092f61824ad9a2aa
-
SHA512
1a20e4093602680702478699025415abcd577927938e66dd800daa17e980cd05cf1beaeded9b0767fe8ad168147b957762f7b8b561593ffde66ea42dad16a3eb
-
SSDEEP
1536:XlpVF6FQ85LFiGkSzyqzin5SP9cljcfcU9CEw9aINe3zH:XdF6F15h/zIn5S1aj+cU9CEw9aINejH
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4bc870c60b0782c25db4a7384637a892a12a0f2557c12475092f61824ad9a2aa
Files
-
4bc870c60b0782c25db4a7384637a892a12a0f2557c12475092f61824ad9a2aa.exe windows:6 windows
Headers