General
-
Target
5742a9c4b9f435a75db7fd4fdd9caaa159d8fe685443764c8d9cac5b86820b71
-
Size
1.3MB
-
Sample
241220-hapnzasjhs
-
MD5
91cd030986445859992d0b54f51c62f1
-
SHA1
86161d60c4ea8b4657cd4877ed523430410b9ca1
-
SHA256
5742a9c4b9f435a75db7fd4fdd9caaa159d8fe685443764c8d9cac5b86820b71
-
SHA512
28dc5b0691dd388978172617f8941711915ab1b557402cfdeca30cbf17c4d2598e6272adc87b10dee305b54c635e6cd32a3c270bea40bb7f2c991a787f239ad7
-
SSDEEP
24576:/1sOeh7E7IJbtEJEHng8wGrQTLq73xaH7pbHVDa:/1sOWFJbtSMXoTLq73xKJu
Static task
static1
Behavioral task
behavioral1
Sample
5742a9c4b9f435a75db7fd4fdd9caaa159d8fe685443764c8d9cac5b86820b71.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
5742a9c4b9f435a75db7fd4fdd9caaa159d8fe685443764c8d9cac5b86820b71
-
Size
1.3MB
-
MD5
91cd030986445859992d0b54f51c62f1
-
SHA1
86161d60c4ea8b4657cd4877ed523430410b9ca1
-
SHA256
5742a9c4b9f435a75db7fd4fdd9caaa159d8fe685443764c8d9cac5b86820b71
-
SHA512
28dc5b0691dd388978172617f8941711915ab1b557402cfdeca30cbf17c4d2598e6272adc87b10dee305b54c635e6cd32a3c270bea40bb7f2c991a787f239ad7
-
SSDEEP
24576:/1sOeh7E7IJbtEJEHng8wGrQTLq73xaH7pbHVDa:/1sOWFJbtSMXoTLq73xKJu
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-