Behavioral task
behavioral1
Sample
681537113ecfd4dd3a3b05898ba5a28bf63691cc747e7d35ad033421e14f2b1d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
681537113ecfd4dd3a3b05898ba5a28bf63691cc747e7d35ad033421e14f2b1d.exe
Resource
win10v2004-20240802-en
General
-
Target
681537113ecfd4dd3a3b05898ba5a28bf63691cc747e7d35ad033421e14f2b1d
-
Size
109KB
-
MD5
619f3aa3f453c955ad6c057d7177305c
-
SHA1
c1a171df2436cd83cf72a214308de27a6f2582dc
-
SHA256
681537113ecfd4dd3a3b05898ba5a28bf63691cc747e7d35ad033421e14f2b1d
-
SHA512
ba903db71496427c287070703c0a816ac3b359b46dce926f6e6f5f69be339ce829f44ae8e7c096f63c8cf454f62030a9211039030378a6748dc62b1b74bce07b
-
SSDEEP
3072:DF6F15h/zIn5S1aj+cU9C8OgGw9aINejT:MFjhLI5SG+F19aIAf
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 681537113ecfd4dd3a3b05898ba5a28bf63691cc747e7d35ad033421e14f2b1d
Files
-
681537113ecfd4dd3a3b05898ba5a28bf63691cc747e7d35ad033421e14f2b1d.exe windows:6 windows
Headers