Behavioral task
behavioral1
Sample
1c43a7c08456633bcb923ea122990663ce08b4a5a6b1737678817e5ee8c2010b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1c43a7c08456633bcb923ea122990663ce08b4a5a6b1737678817e5ee8c2010b.exe
Resource
win10v2004-20240802-en
General
-
Target
1c43a7c08456633bcb923ea122990663ce08b4a5a6b1737678817e5ee8c2010b
-
Size
109KB
-
MD5
00bf88573dda0cbd61ff7713b9da0078
-
SHA1
788a34392cc4886484f8d5e57e11f9782585f595
-
SHA256
1c43a7c08456633bcb923ea122990663ce08b4a5a6b1737678817e5ee8c2010b
-
SHA512
147e355ee127fa0b28b3e6195578f80a4454b62c25926e29ab9dfea8604b63ebec5bf7d8d5731a9b529bdb649711b15e397e1ac3b07d16d13d7e74e06d531040
-
SSDEEP
1536:LF6FQ85LFiGkSzyqzin5SP9cljcfcU9CEw9aINe3zU:LF6F15h/zIn5S1aj+cU9CEw9aINejU
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1c43a7c08456633bcb923ea122990663ce08b4a5a6b1737678817e5ee8c2010b
Files
-
1c43a7c08456633bcb923ea122990663ce08b4a5a6b1737678817e5ee8c2010b.exe windows:6 windows
Headers