General
-
Target
fcf774c2e831fdb46309e8df7e951d86eec8e8956e28a49dda08e3a4fbb52804.msi.vir
-
Size
135.7MB
-
Sample
241128-g5w6vsylet
-
MD5
f251241df91698f6d87500b7ba697399
-
SHA1
0eeb66750d3cbded68ddd579d7c06b657158c829
-
SHA256
fcf774c2e831fdb46309e8df7e951d86eec8e8956e28a49dda08e3a4fbb52804
-
SHA512
3e3eb70d63b68a58c337ec8a94d340e2174806d69873c344fa9b68bba7a82f1c0f5c9bdafc036ddf141980ca4240eecd95592b463ee5e54f52d0af969bdd958e
-
SSDEEP
3145728:eUlSw/0KksfWneWVr6/4J3DYgxqmz8CZCLLUR6qxr7W3G9Ay:plSw/7ksOneWVm/CDYddLYHtKg
Static task
static1
Behavioral task
behavioral1
Sample
fcf774c2e831fdb46309e8df7e951d86eec8e8956e28a49dda08e3a4fbb52804.msi
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fcf774c2e831fdb46309e8df7e951d86eec8e8956e28a49dda08e3a4fbb52804.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
fcf774c2e831fdb46309e8df7e951d86eec8e8956e28a49dda08e3a4fbb52804.msi.vir
-
Size
135.7MB
-
MD5
f251241df91698f6d87500b7ba697399
-
SHA1
0eeb66750d3cbded68ddd579d7c06b657158c829
-
SHA256
fcf774c2e831fdb46309e8df7e951d86eec8e8956e28a49dda08e3a4fbb52804
-
SHA512
3e3eb70d63b68a58c337ec8a94d340e2174806d69873c344fa9b68bba7a82f1c0f5c9bdafc036ddf141980ca4240eecd95592b463ee5e54f52d0af969bdd958e
-
SSDEEP
3145728:eUlSw/0KksfWneWVr6/4J3DYgxqmz8CZCLLUR6qxr7W3G9Ay:plSw/7ksOneWVm/CDYddLYHtKg
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-