Behavioral task
behavioral1
Sample
1a67dd858628f6c407676d045d1c26dad464be78f47560180a790aabfc67463b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1a67dd858628f6c407676d045d1c26dad464be78f47560180a790aabfc67463b.exe
Resource
win10v2004-20240802-en
General
-
Target
1a67dd858628f6c407676d045d1c26dad464be78f47560180a790aabfc67463b
-
Size
109KB
-
MD5
8733d9bb9c02bf6501da7e5d9b98df23
-
SHA1
2985dae5bbb8336b8142f64fdd4f4b09a8c3d209
-
SHA256
1a67dd858628f6c407676d045d1c26dad464be78f47560180a790aabfc67463b
-
SHA512
29452a2214ca15f319dac464e1e678c4366b1930230df39469444dda9cc8abc3cd15ec40997550f14b193eaf9de6b91b6ba728c959bce5df00aa1a37a1b2302c
-
SSDEEP
1536:lF6FQ85LFiGkSzyqzin5SP9cljcfcU9CEw9aINe3za:lF6F15h/zIn5S1aj+cU9CEw9aINeja
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1a67dd858628f6c407676d045d1c26dad464be78f47560180a790aabfc67463b
Files
-
1a67dd858628f6c407676d045d1c26dad464be78f47560180a790aabfc67463b.exe windows:6 windows
Headers