General
-
Target
b80e333a89e86bf38d79fb3f7d7a8f27d15153ec699de2018e77b51bc920ecca
-
Size
1.4MB
-
Sample
250415-raba1syyfx
-
MD5
ff2cd2037f26d637e7b7604b2dc4df07
-
SHA1
3c876d1d9f17b782d6ba5fd4648e4001adec84bd
-
SHA256
b80e333a89e86bf38d79fb3f7d7a8f27d15153ec699de2018e77b51bc920ecca
-
SHA512
2a507f31fafc9d8f7ac1ed1a76b0c0aed45f53884a08306186ae2da435db3b5999c4e67f4f2e28283b5a98ff10e4b585495f5b145a3d0f73cc7b0747627d61d7
-
SSDEEP
24576:F39WaOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:598HPkVOBTK
Static task
static1
Behavioral task
behavioral1
Sample
b80e333a89e86bf38d79fb3f7d7a8f27d15153ec699de2018e77b51bc920ecca.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
b80e333a89e86bf38d79fb3f7d7a8f27d15153ec699de2018e77b51bc920ecca
-
Size
1.4MB
-
MD5
ff2cd2037f26d637e7b7604b2dc4df07
-
SHA1
3c876d1d9f17b782d6ba5fd4648e4001adec84bd
-
SHA256
b80e333a89e86bf38d79fb3f7d7a8f27d15153ec699de2018e77b51bc920ecca
-
SHA512
2a507f31fafc9d8f7ac1ed1a76b0c0aed45f53884a08306186ae2da435db3b5999c4e67f4f2e28283b5a98ff10e4b585495f5b145a3d0f73cc7b0747627d61d7
-
SSDEEP
24576:F39WaOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:598HPkVOBTK
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-