Behavioral task
behavioral1
Sample
4b20dd921132ec913474b0494134d9a604e870c98824f433c1362e2232426463.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4b20dd921132ec913474b0494134d9a604e870c98824f433c1362e2232426463.exe
Resource
win10v2004-20240802-en
General
-
Target
4b20dd921132ec913474b0494134d9a604e870c98824f433c1362e2232426463
-
Size
109KB
-
MD5
b8e1b425c58bc4e325aaf342dbf65412
-
SHA1
dbbbab575642be31d2fe8a626eee2f6486783cb0
-
SHA256
4b20dd921132ec913474b0494134d9a604e870c98824f433c1362e2232426463
-
SHA512
bf4ee62497a1626e46b39ba068f6b418c6cffcca7e80c99cc6fef9069bbcef71ac5e6c93ce31d350faf875e274cbb234aeed886654635043cada45c45439695e
-
SSDEEP
3072:gF6F15h/zIn5S1aj+cU9C82gGw9aINejn:/FjhLI5SG+F19aIAD
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b20dd921132ec913474b0494134d9a604e870c98824f433c1362e2232426463
Files
-
4b20dd921132ec913474b0494134d9a604e870c98824f433c1362e2232426463.exe windows:6 windows
Headers