General
-
Target
889d1078fc995c633b917a07fa18b5645ee0de61277355158b77dd93b5c0875a
-
Size
491KB
-
Sample
250106-hm57gszjav
-
MD5
9f7ff585b645e601eb99c988548383d4
-
SHA1
d02e3e62e525d0dcc75a96c6f8dba9f08060faab
-
SHA256
889d1078fc995c633b917a07fa18b5645ee0de61277355158b77dd93b5c0875a
-
SHA512
09c382e0793b4b7413322a7121381b3f6d1ebd74fe378e42b11e8b226449c07614eb187b4a85239488efd154270f5bdcc5c1606967743ac66dcc8acd376f5053
-
SSDEEP
6144:GpoMkequERu8qQ1fjYMMW9eKZH+IdISTUL24qL9cPKcPzR2Rs6lZv:oDR+u8pfjYMMWNvdhUSByFPzav
Static task
static1
Behavioral task
behavioral1
Sample
889d1078fc995c633b917a07fa18b5645ee0de61277355158b77dd93b5c0875a.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
889d1078fc995c633b917a07fa18b5645ee0de61277355158b77dd93b5c0875a
-
Size
491KB
-
MD5
9f7ff585b645e601eb99c988548383d4
-
SHA1
d02e3e62e525d0dcc75a96c6f8dba9f08060faab
-
SHA256
889d1078fc995c633b917a07fa18b5645ee0de61277355158b77dd93b5c0875a
-
SHA512
09c382e0793b4b7413322a7121381b3f6d1ebd74fe378e42b11e8b226449c07614eb187b4a85239488efd154270f5bdcc5c1606967743ac66dcc8acd376f5053
-
SSDEEP
6144:GpoMkequERu8qQ1fjYMMW9eKZH+IdISTUL24qL9cPKcPzR2Rs6lZv:oDR+u8pfjYMMWNvdhUSByFPzav
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-