General
-
Target
WPS Office_104693057_401556.msi.v
-
Size
13.0MB
-
Sample
240910-q91jhswfpl
-
MD5
a8f0f41ccc09254856bc1bbd2151a15d
-
SHA1
4926bf9e1ca27835ee5a077565979111614c3e25
-
SHA256
745ae5ef809909bdda166d758a529907f4175f3131c451717ca22a536eec57a9
-
SHA512
8371939ad373cb6b6a5bf2cc20158fd60e7ebf91bdc67e8326d63d12aac7efd2600296e52ef1b5ef7acaa8f061a343e3ad45b5f7c1f8ff72f2113ce1f0815524
-
SSDEEP
393216:oGS3skS0F5Ky7pfJY/+LXwwhCtZRZ5bz/ueWr8bf:oG8S0F5N7pfJu2XwwhYZRDbz/uFUf
Static task
static1
Behavioral task
behavioral1
Sample
WPS Office_104693057_401556.msi
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
WPS Office_104693057_401556.msi.v
-
Size
13.0MB
-
MD5
a8f0f41ccc09254856bc1bbd2151a15d
-
SHA1
4926bf9e1ca27835ee5a077565979111614c3e25
-
SHA256
745ae5ef809909bdda166d758a529907f4175f3131c451717ca22a536eec57a9
-
SHA512
8371939ad373cb6b6a5bf2cc20158fd60e7ebf91bdc67e8326d63d12aac7efd2600296e52ef1b5ef7acaa8f061a343e3ad45b5f7c1f8ff72f2113ce1f0815524
-
SSDEEP
393216:oGS3skS0F5Ky7pfJY/+LXwwhCtZRZ5bz/ueWr8bf:oG8S0F5N7pfJu2XwwhYZRDbz/uFUf
-
Gh0st RAT payload
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-