General
-
Target
ghost cheat.exe
-
Size
10.0MB
-
Sample
240930-bv6dwsvdqf
-
MD5
249a1f67c978836ecb8befc961b68a24
-
SHA1
df65e1866385c19420b5e1559e0f07c4d9450723
-
SHA256
0afde0fdb0c168deb5561cfbfa8ea5a09d99d03a9de33ed6cd35fdd935bf9a21
-
SHA512
4cb1192b54a85f8fe6b7311ed15639c2b2c683834fd50f018b1c9fa31c322f5471c73c7c346b7714130f29470f4cdcb5343a3d0c3325a33f34b8f022ac893273
-
SSDEEP
196608:U/FhteN/FJMIDJf0gsAGK5SEQRquAK3n4Io:WW/Fqyf0gsfNtAK4
Behavioral task
behavioral1
Sample
ghost cheat.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
��I+.pyc
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
ghost cheat.exe
-
Size
10.0MB
-
MD5
249a1f67c978836ecb8befc961b68a24
-
SHA1
df65e1866385c19420b5e1559e0f07c4d9450723
-
SHA256
0afde0fdb0c168deb5561cfbfa8ea5a09d99d03a9de33ed6cd35fdd935bf9a21
-
SHA512
4cb1192b54a85f8fe6b7311ed15639c2b2c683834fd50f018b1c9fa31c322f5471c73c7c346b7714130f29470f4cdcb5343a3d0c3325a33f34b8f022ac893273
-
SSDEEP
196608:U/FhteN/FJMIDJf0gsAGK5SEQRquAK3n4Io:WW/Fqyf0gsfNtAK4
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
-
-
Target
��I+.pyc
-
Size
857B
-
MD5
8424b3fec5d5290d1c6dc5c5cfa74f49
-
SHA1
d52d7741954fe8f5340afdea1eea8fe451393209
-
SHA256
8a822e84dd5e13e3de529dad751e10a68964e95209e76e6e263d8058d116b023
-
SHA512
fccfc6e066f326db1e363667a7e243ed2cadfc2e8826926ab81c672b4c1c5f1fbfbcc293fb5c3406f1e3d673b097e6e034d5a95e5edb7f0d6db029bd195359c2
Score1/10 -