General
-
Target
Sample(s).rar
-
Size
25.3MB
-
Sample
241010-slj8qssaph
-
MD5
8e82833830e0465c007040b11ecb5fe0
-
SHA1
868000cbaec4e8f390dd9705716afc1e7f3feab7
-
SHA256
a0efb0165935acc802cfc2da23b50a7867ad7f740d747d08127fa27fa8280775
-
SHA512
553e5c395e14a2248e5df34ac78ad027744189fb5a1fdfe1810443f17fb29d2bc701cfae875c2c1b49de2787d3803d3925229784d1a46bee5c159089664dcb11
-
SSDEEP
393216:kEh6/OwK82CK5X4TyBThBizlXtgqxZ0HYr20UOs2Rs23yOy3scmEuD:th6bKrCK5ImT/wngWOwrs2u2+8cmD
Static task
static1
Behavioral task
behavioral1
Sample
wtepktomp.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
wtepktomp.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
wtepktomp.exe.v
-
Size
27.6MB
-
MD5
4ce843f56cbad3ab43caec3ba7f6071d
-
SHA1
999ecf6203235a3efc3ffa2d599ac4b4ad3e3c2a
-
SHA256
ae783b3c7bcb5ea06fb5eb671da35cbab84fed9ce035c3a322733f409d1dbebe
-
SHA512
fc5992edb859c064a31128dc227158d79d29446d1036c453513e01ba201364b20be118243a36fffdd3deb8f3ec1da85a0896edc99e2de9e4dcdeaf49131e5b96
-
SSDEEP
786432:Dwn4l5mSUNsSjeNes2B2q8H9MNEjHzb141qwHX:DNfm/fUedZwXD0qA
-
Gh0st RAT payload
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-