Behavioral task
behavioral1
Sample
685b2287d30c58c212a6dd2bc901bc2588799efa1f84e6b1791837e769915279.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
685b2287d30c58c212a6dd2bc901bc2588799efa1f84e6b1791837e769915279.exe
Resource
win10v2004-20240802-en
General
-
Target
685b2287d30c58c212a6dd2bc901bc2588799efa1f84e6b1791837e769915279
-
Size
109KB
-
MD5
f76b57cc76e6e9b9db004ae82896a899
-
SHA1
0b665aed5623034c6d69b19b72aee407fd056057
-
SHA256
685b2287d30c58c212a6dd2bc901bc2588799efa1f84e6b1791837e769915279
-
SHA512
ce6d06ae288e99bbefc1b5a175d5e14dd0742da2a122c0c2cc150f6f61fbfbe6762f92a1ff1f2baa4fa59dc85b054a6842673a838d8f65fcc6a30be8dcec4db5
-
SSDEEP
1536:dF6FQ85LFiGkSzyqzin5SP9cljcfcU9CEw9aINe3z7:dF6F15h/zIn5S1aj+cU9CEw9aINej7
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 685b2287d30c58c212a6dd2bc901bc2588799efa1f84e6b1791837e769915279
Files
-
685b2287d30c58c212a6dd2bc901bc2588799efa1f84e6b1791837e769915279.exe windows:6 windows
Headers