General
-
Target
df60b74ff96bb320d1cf8d1a511c56bae2ca8d94ebb6566eca7b51c3521c0171
-
Size
491KB
-
Sample
250109-fz9z4azncv
-
MD5
a40e4a8aaf476b3d9997d05489f87c2a
-
SHA1
dc7f49a217cda95d29d46c0d00afedea7404d7c8
-
SHA256
df60b74ff96bb320d1cf8d1a511c56bae2ca8d94ebb6566eca7b51c3521c0171
-
SHA512
bc31c5fd1c8d5547146ff7d123d9815b92565e0909d32dac71e790cb795c740566d082a166041c62b0b3fa8a21be9f850a894b9a4919563fae9171aea4fde4ca
-
SSDEEP
6144:GpoMkequERu8qQ1fjYMMW9eKZH+IdISTUL24qL9cPKcPzR2RP6lZv:oDR+u8pfjYMMWNvdhUSByFPztv
Static task
static1
Behavioral task
behavioral1
Sample
df60b74ff96bb320d1cf8d1a511c56bae2ca8d94ebb6566eca7b51c3521c0171.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
df60b74ff96bb320d1cf8d1a511c56bae2ca8d94ebb6566eca7b51c3521c0171
-
Size
491KB
-
MD5
a40e4a8aaf476b3d9997d05489f87c2a
-
SHA1
dc7f49a217cda95d29d46c0d00afedea7404d7c8
-
SHA256
df60b74ff96bb320d1cf8d1a511c56bae2ca8d94ebb6566eca7b51c3521c0171
-
SHA512
bc31c5fd1c8d5547146ff7d123d9815b92565e0909d32dac71e790cb795c740566d082a166041c62b0b3fa8a21be9f850a894b9a4919563fae9171aea4fde4ca
-
SSDEEP
6144:GpoMkequERu8qQ1fjYMMW9eKZH+IdISTUL24qL9cPKcPzR2RP6lZv:oDR+u8pfjYMMWNvdhUSByFPztv
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-