Behavioral task
behavioral1
Sample
5b7864cd72becf472279176e4b1963d4870f5759ab5f6cccb67096677eacb7d8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5b7864cd72becf472279176e4b1963d4870f5759ab5f6cccb67096677eacb7d8.exe
Resource
win10v2004-20240910-en
General
-
Target
5b7864cd72becf472279176e4b1963d4870f5759ab5f6cccb67096677eacb7d8
-
Size
109KB
-
MD5
013e722eda77efb3c24b4a27eed654f4
-
SHA1
eb6054857139d3cbf6c9ae2c3ea1387f6d8da88b
-
SHA256
5b7864cd72becf472279176e4b1963d4870f5759ab5f6cccb67096677eacb7d8
-
SHA512
d915ddf5e707ab3a8b870487fa2ffc74d1fddd36901f849759b892a660823b097f80d5e2cd89b25fb034e2b95002c7537211b615a185b5ea9c88485bc01a49e1
-
SSDEEP
3072:CF6F15h/zIn5S1aj+cU9C8Ig5w9aINejS:ZFjhLI5SG+Fc9aIA+
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b7864cd72becf472279176e4b1963d4870f5759ab5f6cccb67096677eacb7d8
Files
-
5b7864cd72becf472279176e4b1963d4870f5759ab5f6cccb67096677eacb7d8.exe windows:6 windows
Headers