General
-
Target
ed8339884443bacb025859838dbecc918aab32be7e41b93970f1983bb6435997.msi.vir
-
Size
243.1MB
-
Sample
241116-pw69gazral
-
MD5
7103d7151e847caf2001c41baa2de623
-
SHA1
b9dcf4fdb338a8cdf46962ea0c9a14355a3ccb8d
-
SHA256
ed8339884443bacb025859838dbecc918aab32be7e41b93970f1983bb6435997
-
SHA512
6efce6da7de17beba373652abdaa35652f9e643b5b4e302c102ebeb57b638a4a01e563bf01318612861d064b1bdee0736524c284c6b56d05840fbcb4117f2a84
-
SSDEEP
6291456:nrZGlD9iUNZLyux8a8X62xgFGckKKkNzCg:nrZCD9BNZvaa8qogIJktC
Static task
static1
Behavioral task
behavioral1
Sample
ed8339884443bacb025859838dbecc918aab32be7e41b93970f1983bb6435997.msi
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ed8339884443bacb025859838dbecc918aab32be7e41b93970f1983bb6435997.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ed8339884443bacb025859838dbecc918aab32be7e41b93970f1983bb6435997.msi.vir
-
Size
243.1MB
-
MD5
7103d7151e847caf2001c41baa2de623
-
SHA1
b9dcf4fdb338a8cdf46962ea0c9a14355a3ccb8d
-
SHA256
ed8339884443bacb025859838dbecc918aab32be7e41b93970f1983bb6435997
-
SHA512
6efce6da7de17beba373652abdaa35652f9e643b5b4e302c102ebeb57b638a4a01e563bf01318612861d064b1bdee0736524c284c6b56d05840fbcb4117f2a84
-
SSDEEP
6291456:nrZGlD9iUNZLyux8a8X62xgFGckKKkNzCg:nrZCD9BNZvaa8qogIJktC
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-