General
-
Target
WPSOffice10469357401533.msi.v
-
Size
41.1MB
-
Sample
240922-q8hbjssgmd
-
MD5
27ba48360e40e33e30f22f9258ca8aec
-
SHA1
f86f07a4fde054f77591c7c42a751f4fa566cdd5
-
SHA256
593c2deaacb09860822ec349224494c5aa35ebac3ff8836b43f63ad41d168d60
-
SHA512
0ba2009808c661cc9780bdf437f2ca47cfb99daa080f95428f3631752d2f49f6fce1ec747ef9228e49e3df00db61b67d4f52c4411d76cb6551fb6f50eaf90497
-
SSDEEP
786432:bz9YO2wwhIk3QM8g4fzggu4Pm7WJn8tKFodQrzRIwio026V:Fa3Qg4fzgh4fn8tKFeQr9tiod6V
Static task
static1
Behavioral task
behavioral1
Sample
WPSOffice10469357401533.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
WPSOffice10469357401533.msi
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
WPSOffice10469357401533.msi.v
-
Size
41.1MB
-
MD5
27ba48360e40e33e30f22f9258ca8aec
-
SHA1
f86f07a4fde054f77591c7c42a751f4fa566cdd5
-
SHA256
593c2deaacb09860822ec349224494c5aa35ebac3ff8836b43f63ad41d168d60
-
SHA512
0ba2009808c661cc9780bdf437f2ca47cfb99daa080f95428f3631752d2f49f6fce1ec747ef9228e49e3df00db61b67d4f52c4411d76cb6551fb6f50eaf90497
-
SSDEEP
786432:bz9YO2wwhIk3QM8g4fzggu4Pm7WJn8tKFodQrzRIwio026V:Fa3Qg4fzgh4fn8tKFeQr9tiod6V
-
Gh0st RAT payload
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-