General
-
Target
55884dd052613e18da67ca7a2c9bdf4221102b5328d13619c73187590a07249b.msi.vir
-
Size
135.7MB
-
Sample
241107-np1yfa1gja
-
MD5
8ec4ab0d1a1120dc9c159f807ef45c04
-
SHA1
7e904e814178238293e2ca11989f4245df1a0a6f
-
SHA256
55884dd052613e18da67ca7a2c9bdf4221102b5328d13619c73187590a07249b
-
SHA512
14d2b2cd195049c1566fde868965fa0a28caef2cd7a78f4e0f04023ce40a9600e1b9c26262568c929c6990a89e0aa58b5abbba6e7c47a96fe07adf2b377e2640
-
SSDEEP
3145728:vilSw/0KksfWneWVr6/4J3DYgxqmz8CZCLLURjTN:alSw/7ksOneWVm/CDYddLYt
Static task
static1
Behavioral task
behavioral1
Sample
55884dd052613e18da67ca7a2c9bdf4221102b5328d13619c73187590a07249b.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
55884dd052613e18da67ca7a2c9bdf4221102b5328d13619c73187590a07249b.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
55884dd052613e18da67ca7a2c9bdf4221102b5328d13619c73187590a07249b.msi.vir
-
Size
135.7MB
-
MD5
8ec4ab0d1a1120dc9c159f807ef45c04
-
SHA1
7e904e814178238293e2ca11989f4245df1a0a6f
-
SHA256
55884dd052613e18da67ca7a2c9bdf4221102b5328d13619c73187590a07249b
-
SHA512
14d2b2cd195049c1566fde868965fa0a28caef2cd7a78f4e0f04023ce40a9600e1b9c26262568c929c6990a89e0aa58b5abbba6e7c47a96fe07adf2b377e2640
-
SSDEEP
3145728:vilSw/0KksfWneWVr6/4J3DYgxqmz8CZCLLURjTN:alSw/7ksOneWVm/CDYddLYt
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-