Behavioral task
behavioral1
Sample
859e29ffef7fbd1420f695e83b30dec65af244f40d4da793d4238563cb1f5274.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
859e29ffef7fbd1420f695e83b30dec65af244f40d4da793d4238563cb1f5274.exe
Resource
win10v2004-20240802-en
General
-
Target
859e29ffef7fbd1420f695e83b30dec65af244f40d4da793d4238563cb1f5274
-
Size
109KB
-
MD5
b3f26bf49b8207758782b1eb2aa1d346
-
SHA1
e1fa98384173283312be8a4bbe6db0fd48099302
-
SHA256
859e29ffef7fbd1420f695e83b30dec65af244f40d4da793d4238563cb1f5274
-
SHA512
86400be7f254e93c8eff6c5e32e44234c0236f2548b8c48e1a6959de4db5e84d4c91ef44e8a4a750d6d886eba3fc7c70a6695f839cf1583d50ce75b47e71e660
-
SSDEEP
3072:BF6F15h/zIn5S1aj+cU9C8dgGw9aINejF:iFjhLI5SG+FA9aIAB
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 859e29ffef7fbd1420f695e83b30dec65af244f40d4da793d4238563cb1f5274
Files
-
859e29ffef7fbd1420f695e83b30dec65af244f40d4da793d4238563cb1f5274.exe windows:6 windows
Headers