General
-
Target
52c8a9d77902c28e3bd54ae540a950b74f03f9b976efe42da0adac1cf7088241
-
Size
512KB
-
Sample
241216-qsfssa1pfy
-
MD5
f48442aa73b737ff87c210e59ff49489
-
SHA1
f1c984c462557b5386608d259277e6c4375021e0
-
SHA256
52c8a9d77902c28e3bd54ae540a950b74f03f9b976efe42da0adac1cf7088241
-
SHA512
fd8efcdd2704711337e3bb63b7fa983ef17ffee84342b37154ab384e1734b3e662187ddb301017070cdf5e5d3193acb2996d57a7d2cf3fd71133c6ec43f53985
-
SSDEEP
12288:y6vt/FcUrAqObSVsy7/J+KnUHwNudfjvLxu1K5etQsS0zWbtz68J2Q:XvrADCr/JNOwNudf81KOS/t3U
Behavioral task
behavioral1
Sample
52c8a9d77902c28e3bd54ae540a950b74f03f9b976efe42da0adac1cf7088241.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
52c8a9d77902c28e3bd54ae540a950b74f03f9b976efe42da0adac1cf7088241
-
Size
512KB
-
MD5
f48442aa73b737ff87c210e59ff49489
-
SHA1
f1c984c462557b5386608d259277e6c4375021e0
-
SHA256
52c8a9d77902c28e3bd54ae540a950b74f03f9b976efe42da0adac1cf7088241
-
SHA512
fd8efcdd2704711337e3bb63b7fa983ef17ffee84342b37154ab384e1734b3e662187ddb301017070cdf5e5d3193acb2996d57a7d2cf3fd71133c6ec43f53985
-
SSDEEP
12288:y6vt/FcUrAqObSVsy7/J+KnUHwNudfjvLxu1K5etQsS0zWbtz68J2Q:XvrADCr/JNOwNudf81KOS/t3U
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-