Behavioral task
behavioral1
Sample
7cf504b86600ba5667afc616f39dbceb40c7abe49a14136edc34486547ce0e24.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7cf504b86600ba5667afc616f39dbceb40c7abe49a14136edc34486547ce0e24.exe
Resource
win10v2004-20240802-en
General
-
Target
7cf504b86600ba5667afc616f39dbceb40c7abe49a14136edc34486547ce0e24
-
Size
109KB
-
MD5
97ef41891556de9ed28256c5284f6c12
-
SHA1
31140f7397176ccd50d14da1244c1b72a06a52ee
-
SHA256
7cf504b86600ba5667afc616f39dbceb40c7abe49a14136edc34486547ce0e24
-
SHA512
814bb610456556ba8bd675b44764b7eca5d6184e704d8f6c1a1502f89ed17d7aac946c8ea71e8ab5051dc511a9b5764b7bf06b785092577318930dc45a33e13d
-
SSDEEP
1536:5RF6FQ85LFiGkSzyqzin5SP9cljcfcU9CEw9aINe3zu:5RF6F15h/zIn5S1aj+cU9CEw9aINeju
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7cf504b86600ba5667afc616f39dbceb40c7abe49a14136edc34486547ce0e24
Files
-
7cf504b86600ba5667afc616f39dbceb40c7abe49a14136edc34486547ce0e24.exe windows:6 windows
Headers