General
-
Target
14ca7e0d2de215f17d3a5b8927a104af64569214879c22be7b58010761ad86ea
-
Size
1.5MB
-
Sample
250306-1myfrax1hs
-
MD5
b67c3bf0f3cbd1038493ffd216c6b9a3
-
SHA1
0ede729b15973ff5baac7056631c98b0a8684171
-
SHA256
14ca7e0d2de215f17d3a5b8927a104af64569214879c22be7b58010761ad86ea
-
SHA512
5cd64a9f674147c0d279b7465dbb7db50d99326ea641e89d999501b0a7e92619e08a154c7ac4c04dfdac5be08c6183df54d6a59d1ce7aad713ac2ac1422bfc69
-
SSDEEP
24576:eYVLN+uGOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:BTT3HPkVOBTK
Static task
static1
Behavioral task
behavioral1
Sample
14ca7e0d2de215f17d3a5b8927a104af64569214879c22be7b58010761ad86ea.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
14ca7e0d2de215f17d3a5b8927a104af64569214879c22be7b58010761ad86ea
-
Size
1.5MB
-
MD5
b67c3bf0f3cbd1038493ffd216c6b9a3
-
SHA1
0ede729b15973ff5baac7056631c98b0a8684171
-
SHA256
14ca7e0d2de215f17d3a5b8927a104af64569214879c22be7b58010761ad86ea
-
SHA512
5cd64a9f674147c0d279b7465dbb7db50d99326ea641e89d999501b0a7e92619e08a154c7ac4c04dfdac5be08c6183df54d6a59d1ce7aad713ac2ac1422bfc69
-
SSDEEP
24576:eYVLN+uGOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:BTT3HPkVOBTK
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-