General
-
Target
9ebd0d7062ac4991337e099bcebcc98c822b649b05b5107d8a98b98bbb249692.exe
-
Size
1.4MB
-
Sample
250120-1x8dps1pfj
-
MD5
fc91d27f08627581d7dd69cd304709a8
-
SHA1
8a04c3e378bb1cf52030182f7a3c16f9cbc94cca
-
SHA256
9ebd0d7062ac4991337e099bcebcc98c822b649b05b5107d8a98b98bbb249692
-
SHA512
c7826b0fd103a4f77075b5a9b52422529b4617c84ab481849afbbb9ffa2be255b91301617c9c7a39d65b61b29e42acffc1bd45dce6b7466aa2e617ef2850b311
-
SSDEEP
24576:F39WaOyHutimZ9VSly2hVvHW6qMnSbTBBhBMNy:598HPkVOBTKy
Static task
static1
Behavioral task
behavioral1
Sample
9ebd0d7062ac4991337e099bcebcc98c822b649b05b5107d8a98b98bbb249692.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
9ebd0d7062ac4991337e099bcebcc98c822b649b05b5107d8a98b98bbb249692.exe
-
Size
1.4MB
-
MD5
fc91d27f08627581d7dd69cd304709a8
-
SHA1
8a04c3e378bb1cf52030182f7a3c16f9cbc94cca
-
SHA256
9ebd0d7062ac4991337e099bcebcc98c822b649b05b5107d8a98b98bbb249692
-
SHA512
c7826b0fd103a4f77075b5a9b52422529b4617c84ab481849afbbb9ffa2be255b91301617c9c7a39d65b61b29e42acffc1bd45dce6b7466aa2e617ef2850b311
-
SSDEEP
24576:F39WaOyHutimZ9VSly2hVvHW6qMnSbTBBhBMNy:598HPkVOBTKy
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-