Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 02:11
Behavioral task
behavioral1
Sample
6071e5f0aff7e9ca072a6f0d4d224872afe0b59fb86d81c6f10e9be8025f7986.exe
Resource
win7-20240708-en
4 signatures
150 seconds
General
-
Target
6071e5f0aff7e9ca072a6f0d4d224872afe0b59fb86d81c6f10e9be8025f7986.exe
-
Size
125KB
-
MD5
9a008f9db045e30320e4ef30b7d3d6a4
-
SHA1
8eb084fc6ca58a69f5ae221b843d7251256b8487
-
SHA256
6071e5f0aff7e9ca072a6f0d4d224872afe0b59fb86d81c6f10e9be8025f7986
-
SHA512
e5f57d75f801f81b75e3acc7f1cd7017aca2360de0c683f9928938ce62613f887bc71748f41dec2d985b69516e02fb87f6a75104c8491c3697fc97d6d97f43f1
-
SSDEEP
3072:JY/wTle9dJ1OIG5WpnrEIjt9z/wa0Q0z:SwTIHu6oIPzwaD
Malware Config
Extracted
Family
gh0strat
C2
10.177.224.219
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2112-1-0x0000000010000000-0x0000000010017000-memory.dmp family_gh0strat behavioral1/memory/2112-4-0x0000000000400000-0x0000000000467000-memory.dmp family_gh0strat -
resource yara_rule behavioral1/memory/2112-0-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/2112-4-0x0000000000400000-0x0000000000467000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6071e5f0aff7e9ca072a6f0d4d224872afe0b59fb86d81c6f10e9be8025f7986.exe