Behavioral task
behavioral1
Sample
620102fd12d6bb8d3f50b5679c40b7ce9a2e323494ecfef67b1b8cc27399e7e6.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
620102fd12d6bb8d3f50b5679c40b7ce9a2e323494ecfef67b1b8cc27399e7e6.exe
Resource
win10v2004-20240802-en
General
-
Target
620102fd12d6bb8d3f50b5679c40b7ce9a2e323494ecfef67b1b8cc27399e7e6
-
Size
109KB
-
MD5
b838abc8b234208c5daf00171bef9071
-
SHA1
f1cba3c00230b74b546bc386b15405d82b1b7c9e
-
SHA256
620102fd12d6bb8d3f50b5679c40b7ce9a2e323494ecfef67b1b8cc27399e7e6
-
SHA512
a876fbc7c537033ecbc8075aab7a12712d8a2a06e0a23f54898d9262264478ef171824366fd73e6eaad08fd72b4c19918ef54148d6301303d7bd798b993ef180
-
SSDEEP
3072:2F6F15h/zIn5S1aj+cU9C84gGw9aINejg:FFjhLI5SG+Fr9aIAs
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 620102fd12d6bb8d3f50b5679c40b7ce9a2e323494ecfef67b1b8cc27399e7e6
Files
-
620102fd12d6bb8d3f50b5679c40b7ce9a2e323494ecfef67b1b8cc27399e7e6.exe windows:6 windows
Headers