General
-
Target
WPS-Office_10469357_401532.msi.v
-
Size
34.7MB
-
Sample
241003-gtm4taybkm
-
MD5
0648eae1b36fb6c8e1b9b5a5b28abe96
-
SHA1
52a313b76e9ab28b360b406f2886c324cc931c43
-
SHA256
60ab90f343c109734ee5d53b62397d754152c30e7bc2f9ab3114f45d59e4a252
-
SHA512
63e30921921920cd4dba054e3d7c8ff1225f5ce2f2bc987f543bb3c5ea290b87acc0b13e86891c76f72a040a0c821c3da9264212294f66118cc49aa6776f8091
-
SSDEEP
786432:qddVYfcDIfXi1q8W3TRThlXgBopO+ZgiM2yoLPsa2:qddVYfUspDrO+ZDM2vLPsa2
Static task
static1
Behavioral task
behavioral1
Sample
WPS-Office_10469357_401532.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
WPS-Office_10469357_401532.msi
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
WPS-Office_10469357_401532.msi.v
-
Size
34.7MB
-
MD5
0648eae1b36fb6c8e1b9b5a5b28abe96
-
SHA1
52a313b76e9ab28b360b406f2886c324cc931c43
-
SHA256
60ab90f343c109734ee5d53b62397d754152c30e7bc2f9ab3114f45d59e4a252
-
SHA512
63e30921921920cd4dba054e3d7c8ff1225f5ce2f2bc987f543bb3c5ea290b87acc0b13e86891c76f72a040a0c821c3da9264212294f66118cc49aa6776f8091
-
SSDEEP
786432:qddVYfcDIfXi1q8W3TRThlXgBopO+ZgiM2yoLPsa2:qddVYfUspDrO+ZDM2vLPsa2
-
Gh0st RAT payload
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-