General
-
Target
394a8f10d37c5e0984bdc3379975f2784ba5d0dad3c7ebef82069cc62a5e668e.msi.vir
-
Size
135.8MB
-
Sample
241124-mtzqhaskcp
-
MD5
60a6725c5490188bbdd4d899c58cd735
-
SHA1
67d849ee9a93d73219ded38bced51f5d002d7a34
-
SHA256
394a8f10d37c5e0984bdc3379975f2784ba5d0dad3c7ebef82069cc62a5e668e
-
SHA512
7f72e27545e8e497e0b48960d119a201f7e14dfe0d95e24ce30e92807e731a7bee0139047389c3f1fbae02f7d2c56a057b52c8b79418a05c8331aaf40d009506
-
SSDEEP
3145728:ISlSw/0KksfWneWVr6/4J3DYgxqmz8CZCLLURrFV:FlSw/7ksOneWVm/CDYddLYr
Static task
static1
Behavioral task
behavioral1
Sample
394a8f10d37c5e0984bdc3379975f2784ba5d0dad3c7ebef82069cc62a5e668e.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
394a8f10d37c5e0984bdc3379975f2784ba5d0dad3c7ebef82069cc62a5e668e.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
394a8f10d37c5e0984bdc3379975f2784ba5d0dad3c7ebef82069cc62a5e668e.msi.vir
-
Size
135.8MB
-
MD5
60a6725c5490188bbdd4d899c58cd735
-
SHA1
67d849ee9a93d73219ded38bced51f5d002d7a34
-
SHA256
394a8f10d37c5e0984bdc3379975f2784ba5d0dad3c7ebef82069cc62a5e668e
-
SHA512
7f72e27545e8e497e0b48960d119a201f7e14dfe0d95e24ce30e92807e731a7bee0139047389c3f1fbae02f7d2c56a057b52c8b79418a05c8331aaf40d009506
-
SSDEEP
3145728:ISlSw/0KksfWneWVr6/4J3DYgxqmz8CZCLLURrFV:FlSw/7ksOneWVm/CDYddLYr
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-