General
-
Target
56dd157bbfede1d15cb1169613abc944c2364a138e27a4a118c78847ebc9bd72.dll
-
Size
1.6MB
-
Sample
241110-cwyk4sxfpc
-
MD5
c5d9033a0433e8d19e9f8c1970dc6d5d
-
SHA1
a779adcd489edb6bde7c13a817fdec604c781635
-
SHA256
56dd157bbfede1d15cb1169613abc944c2364a138e27a4a118c78847ebc9bd72
-
SHA512
23114c7b797462046b153e44b26a20724c6ffb94d7211d5ee75497fae11eb32ac1450505dd13b3d045447226fc7071c90d66c39c568512b2a7f2e1079355ca15
-
SSDEEP
24576:4pLOet+FXyv5pGJd1GdQmw7dj6ypuNiTdjvPG4/:4pLnt+FS+1GnAj4ipjnL/
Static task
static1
Behavioral task
behavioral1
Sample
56dd157bbfede1d15cb1169613abc944c2364a138e27a4a118c78847ebc9bd72.dll
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
56dd157bbfede1d15cb1169613abc944c2364a138e27a4a118c78847ebc9bd72.dll
-
Size
1.6MB
-
MD5
c5d9033a0433e8d19e9f8c1970dc6d5d
-
SHA1
a779adcd489edb6bde7c13a817fdec604c781635
-
SHA256
56dd157bbfede1d15cb1169613abc944c2364a138e27a4a118c78847ebc9bd72
-
SHA512
23114c7b797462046b153e44b26a20724c6ffb94d7211d5ee75497fae11eb32ac1450505dd13b3d045447226fc7071c90d66c39c568512b2a7f2e1079355ca15
-
SSDEEP
24576:4pLOet+FXyv5pGJd1GdQmw7dj6ypuNiTdjvPG4/:4pLnt+FS+1GnAj4ipjnL/
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Blocklisted process makes network request
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-