General
-
Target
dd258c850e41bb8df0238da0e787151effe0fd90562df933981fb54cbee7e8f4
-
Size
491KB
-
Sample
250331-z3f1za1kx2
-
MD5
d00f10af281154b343d93b10f0fc8345
-
SHA1
ee10283480555ebc5516f6e3f49b4e9377822ae8
-
SHA256
dd258c850e41bb8df0238da0e787151effe0fd90562df933981fb54cbee7e8f4
-
SHA512
99fd62b175105da52a2b0ebb951f4123fdf2db9be12c549408d50a54fb93e6f7ac057f50f9eb3b13d59e61673581323c3182402acbc0f1f16b48246a86b4baee
-
SSDEEP
6144:GpoMkequERu8qQ1fjYMMW9eKZH+IdISTUL24qL9cPKcPzR2R/6lZv:oDR+u8pfjYMMWNvdhUSByFPzpv
Static task
static1
Malware Config
Targets
-
-
Target
dd258c850e41bb8df0238da0e787151effe0fd90562df933981fb54cbee7e8f4
-
Size
491KB
-
MD5
d00f10af281154b343d93b10f0fc8345
-
SHA1
ee10283480555ebc5516f6e3f49b4e9377822ae8
-
SHA256
dd258c850e41bb8df0238da0e787151effe0fd90562df933981fb54cbee7e8f4
-
SHA512
99fd62b175105da52a2b0ebb951f4123fdf2db9be12c549408d50a54fb93e6f7ac057f50f9eb3b13d59e61673581323c3182402acbc0f1f16b48246a86b4baee
-
SSDEEP
6144:GpoMkequERu8qQ1fjYMMW9eKZH+IdISTUL24qL9cPKcPzR2R/6lZv:oDR+u8pfjYMMWNvdhUSByFPzpv
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-