General
-
Target
39f3450dc1503693b8b8ecc736a66cb63674b77ea50ee68a52624209f6193081
-
Size
2.0MB
-
Sample
241120-qk8tlaxgnk
-
MD5
27e74ec0b731e1cd1a4426ef0946507d
-
SHA1
a1a53f5d8352c209b761918d1655cd1bf741ca7e
-
SHA256
39f3450dc1503693b8b8ecc736a66cb63674b77ea50ee68a52624209f6193081
-
SHA512
798f5419ad5d4fcf3e26d0d47d6dbf126d47dc72e8d65d38bcb7e4de0a3ab425a7b12b0a20f1b53241fed7e1d0cb470cfcc570056e6c709308b7d2839ca0f1a0
-
SSDEEP
49152:gr3EMXDwDf60xhID/td/LOe8lJ9nTV7Or7L4uIt+ojQfi:g7EqUDy0xhID1db2nYHUuIjQa
Static task
static1
Behavioral task
behavioral1
Sample
luoma2.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
luoma2.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
luoma2.msi
-
Size
2.0MB
-
MD5
44933b8bcf9994f8d5088dbfd75bd781
-
SHA1
4daeed4b62ec79ce1416ad7f62107db4525aeedc
-
SHA256
2f77174a331482149dbb2a31cc57aebac7b7466ddbb309e40003c45bfad2e9da
-
SHA512
e4c7297b7054960652090d5efabf9407a359ee547bea64ba9d6ddef325278c9f930be004ea1eccb11bf3aa10f3a4a61c1abf629f4a07c668864eb1acedec2aec
-
SSDEEP
49152:JxB+M1DwJ9AQNvKbJ917NIe87J3ZbBjqrDvytoqjaxP:J7+EUJeQNvKb/75oZU/vyjad
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-