Analysis
-
max time kernel
0s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 06:16
Behavioral task
behavioral1
Sample
83803037d5f38b78cee615f99e834659f7e934dd8eb27719d29e4590e2a29787.exe
Resource
win7-20250207-en
General
-
Target
83803037d5f38b78cee615f99e834659f7e934dd8eb27719d29e4590e2a29787.exe
-
Size
1.2MB
-
MD5
2cb4a761906448320fe3b72d3198be5c
-
SHA1
9cfa2a6c985bd5f9cbf92d87732abc6ab2ef9449
-
SHA256
83803037d5f38b78cee615f99e834659f7e934dd8eb27719d29e4590e2a29787
-
SHA512
26ed7d48ee645f83ff7e09ccc8a777b99ac0f7f7d6a83ece60d24728dab33e2d8c0d46ab7eaea032812fb71295d89b85585aa0a5fbdcd4dc565865121c52b064
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtif:WIwgMEuy+inDfp3/XoCw57XYBwKf
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral1/files/0x0008000000015e37-15.dat family_gh0strat behavioral1/memory/2732-47-0x0000000010000000-0x00000000101BA000-memory.dmp family_gh0strat behavioral1/memory/2732-49-0x0000000010000000-0x00000000101BA000-memory.dmp family_gh0strat behavioral1/memory/2732-53-0x0000000010000000-0x00000000101BA000-memory.dmp family_gh0strat -
Gh0strat family
-
resource yara_rule behavioral1/memory/2484-0-0x0000000000400000-0x0000000000760000-memory.dmp vmprotect behavioral1/memory/2484-1-0x0000000000400000-0x0000000000760000-memory.dmp vmprotect -
resource yara_rule behavioral1/memory/1972-21-0x0000000010000000-0x00000000101BA000-memory.dmp upx behavioral1/memory/2732-47-0x0000000010000000-0x00000000101BA000-memory.dmp upx behavioral1/memory/2732-49-0x0000000010000000-0x00000000101BA000-memory.dmp upx behavioral1/memory/2732-53-0x0000000010000000-0x00000000101BA000-memory.dmp upx -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2780 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2780 PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\83803037d5f38b78cee615f99e834659f7e934dd8eb27719d29e4590e2a29787.exe"C:\Users\Admin\AppData\Local\Temp\83803037d5f38b78cee615f99e834659f7e934dd8eb27719d29e4590e2a29787.exe"1⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\AK74.exeC:\Users\Admin\AppData\Local\Temp\\AK74.exe2⤵PID:1972
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2736
-
-
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.11⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD5751a81a5794a4cd309d19a93ce5d5c66
SHA1e44763d10e87cc98e633bf729146ccf02e8fd812
SHA2567ab01f3e20a91f59a4d29266fa48b5e57a66354c110f554b566e78fc410f6357
SHA512975a989cc1297a81f616b4a89250a25f938d31f12cc870f99ba957f917500bca87aa0888338580d201312bc0eb817c7b04ea45e41d8878dd9c807f3105f164fd
-
Filesize
91KB
MD5423eb994ed553294f8a6813619b8da87
SHA1eca6a16ccd13adcfc27bc1041ddef97ec8081255
SHA256050b4f2d5ae8eaecd414318dc8e222a56f169626da6ca8feb7edd78e8b1f0218
SHA512fab0a9af8031c242c486de373df7277c8b0e39f7a0c9c2ac2e385dbd3ea67be16e91b128287634f76131e5264149ab1b452cd21df4c4895e8c4efc8d8cf99095
-
Filesize
386KB
MD54ca122dfd51c09ec95aecbff5d669993
SHA193b7b087cb5c89500c4be811bf6f096f9169b104
SHA2566972f1a6cfe961ed9a5314c1dfd00633ee304995b16aebcf4ca359ce02c50c6c
SHA512a023a4f22705cfb640d2f2123c48a97295b87d657e98cea52b9c8120514ca8244dc94dbfe7a15a6f05897cd69a762756756e96fb28712c730ba8807e6f8d858d
-
Filesize
49KB
MD544215fb1afd01851e8d50825af757822
SHA134086fe4ee1bddfd4847b0bfce168454dfcaf182
SHA2563895a5c579581aa4a8ead68abe5640ab8f3e86efd9118ffc127646b9cbbe5fc2
SHA51213332f118af2775ce85379f0f3d23bca9c17813039956e3dba3a496444d9aea6dbf1ec3713fb5a335988f474369dbbb443f15fe23818f3f4a75930975f16b23c