General
-
Target
03ab1d0b6fc6c55d47d809c0e4109778369911285108d8d4ede29f08b902180c
-
Size
874KB
-
Sample
250109-g2xm8a1ngw
-
MD5
f9a2781ea897d05ffa3ededdb2452745
-
SHA1
0cd354d083a5d9ad11b15bdc1e268118a505ce1c
-
SHA256
03ab1d0b6fc6c55d47d809c0e4109778369911285108d8d4ede29f08b902180c
-
SHA512
623fec269f3bf88886b58156fd2e7f6faad864dce60e75142cf41264450e7ab58e50302582ec523958dae46b15d078420cd1396db9fab9ae49e6df3992bee96a
-
SSDEEP
24576:+vrADCr/JNOwNudf81KOS/t3UaJZE4HwJ+q:+vse9pwaU1EaJZPw+q
Behavioral task
behavioral1
Sample
03ab1d0b6fc6c55d47d809c0e4109778369911285108d8d4ede29f08b902180c.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
03ab1d0b6fc6c55d47d809c0e4109778369911285108d8d4ede29f08b902180c
-
Size
874KB
-
MD5
f9a2781ea897d05ffa3ededdb2452745
-
SHA1
0cd354d083a5d9ad11b15bdc1e268118a505ce1c
-
SHA256
03ab1d0b6fc6c55d47d809c0e4109778369911285108d8d4ede29f08b902180c
-
SHA512
623fec269f3bf88886b58156fd2e7f6faad864dce60e75142cf41264450e7ab58e50302582ec523958dae46b15d078420cd1396db9fab9ae49e6df3992bee96a
-
SSDEEP
24576:+vrADCr/JNOwNudf81KOS/t3UaJZE4HwJ+q:+vse9pwaU1EaJZPw+q
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Deletes itself
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-