General
-
Target
WPS Office_104693057_401535.msi.v
-
Size
15.4MB
-
Sample
240920-e3qvysycqb
-
MD5
ca9086b9f4e1cbfae86204a0e2cbea07
-
SHA1
4fb147699ab8b80fc6b89d9d1473bfb60dbd2a15
-
SHA256
21a2e0d27dfe4f70d74e0be94a1700cbc0e58c87553f1140253109ab0d9701b2
-
SHA512
b1f89f9342df8de10eaa1134eb9982942cee26abebf280b80a79b37f26e1f2b55de999d36249a731385c5a72bb2c3dd8b9b14f578263d3037799a1617279e984
-
SSDEEP
393216:WAxJ3qt2MkEOEsQ+D8PjbtTBQqc4dq47aJ7IKw9M38hoTjZ5Uu0H:WU3o2NNjgrpFQq3dd7aJkvFhoTrV0H
Static task
static1
Behavioral task
behavioral1
Sample
WPS Office_104693057_401535.msi
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
WPS Office_104693057_401535.msi.v
-
Size
15.4MB
-
MD5
ca9086b9f4e1cbfae86204a0e2cbea07
-
SHA1
4fb147699ab8b80fc6b89d9d1473bfb60dbd2a15
-
SHA256
21a2e0d27dfe4f70d74e0be94a1700cbc0e58c87553f1140253109ab0d9701b2
-
SHA512
b1f89f9342df8de10eaa1134eb9982942cee26abebf280b80a79b37f26e1f2b55de999d36249a731385c5a72bb2c3dd8b9b14f578263d3037799a1617279e984
-
SSDEEP
393216:WAxJ3qt2MkEOEsQ+D8PjbtTBQqc4dq47aJ7IKw9M38hoTjZ5Uu0H:WU3o2NNjgrpFQq3dd7aJkvFhoTrV0H
-
Gh0st RAT payload
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-