General
-
Target
63fdeec62e78c9c5c6a4249c4b58b85d34e1ddf7b47f6e46257be4f93b703c72
-
Size
1.7MB
-
Sample
241223-s8amtatndm
-
MD5
469d3951ab182e7670feb67f4b461a82
-
SHA1
c8591e43f3119fde38a725671f883c3eedd3d22c
-
SHA256
63fdeec62e78c9c5c6a4249c4b58b85d34e1ddf7b47f6e46257be4f93b703c72
-
SHA512
2994015b87a1d3e106327f4a0132b32d1f60d50c661f002e5092b74caa9844282ac8413ce7c68a4d24d22b8fcf6eff740bf82f8b8c41637f4ac480f8f3c8e5fd
-
SSDEEP
24576:P0/RLoHZ2AkKIEkK48rktw9E4/vwZ31dvAhuiTFli7X8uZyzo1dqtbVEj3i4zcyz:P0to5lLIxKewS4+KPOX8uQzo16E/cyvL
Static task
static1
Behavioral task
behavioral1
Sample
63fdeec62e78c9c5c6a4249c4b58b85d34e1ddf7b47f6e46257be4f93b703c72.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
63fdeec62e78c9c5c6a4249c4b58b85d34e1ddf7b47f6e46257be4f93b703c72.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
63fdeec62e78c9c5c6a4249c4b58b85d34e1ddf7b47f6e46257be4f93b703c72
-
Size
1.7MB
-
MD5
469d3951ab182e7670feb67f4b461a82
-
SHA1
c8591e43f3119fde38a725671f883c3eedd3d22c
-
SHA256
63fdeec62e78c9c5c6a4249c4b58b85d34e1ddf7b47f6e46257be4f93b703c72
-
SHA512
2994015b87a1d3e106327f4a0132b32d1f60d50c661f002e5092b74caa9844282ac8413ce7c68a4d24d22b8fcf6eff740bf82f8b8c41637f4ac480f8f3c8e5fd
-
SSDEEP
24576:P0/RLoHZ2AkKIEkK48rktw9E4/vwZ31dvAhuiTFli7X8uZyzo1dqtbVEj3i4zcyz:P0to5lLIxKewS4+KPOX8uQzo16E/cyvL
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-