Behavioral task
behavioral1
Sample
59951c7140c666ce31e9ab22347f43b34a5816388c8978d4b26804d6550465ab.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
59951c7140c666ce31e9ab22347f43b34a5816388c8978d4b26804d6550465ab.exe
Resource
win10v2004-20241007-en
General
-
Target
59951c7140c666ce31e9ab22347f43b34a5816388c8978d4b26804d6550465ab
-
Size
109KB
-
MD5
86ececbf05ae879be8f58fc411b93393
-
SHA1
b34e24b3ccb05d008b06321b430e4fc16ee0cd08
-
SHA256
59951c7140c666ce31e9ab22347f43b34a5816388c8978d4b26804d6550465ab
-
SHA512
724234851bc2ab8a0df6f85738e3c46a26da6bf880d2c1dc58a490a75f9cb11d851d864d9c0b91f401d51899dc0b98a3dc12d3c2cc40b14113344af114815a9b
-
SSDEEP
1536:MF6FQ85LFiGkSzyqzin5SP9cljcfcU9Clg5w9aINe3z0:MF6F15h/zIn5S1aj+cU9Clg5w9aINej0
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule sample acprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 59951c7140c666ce31e9ab22347f43b34a5816388c8978d4b26804d6550465ab
Files
-
59951c7140c666ce31e9ab22347f43b34a5816388c8978d4b26804d6550465ab.exe windows:6 windows
Headers