General
-
Target
tmp
-
Size
2.6MB
-
Sample
230519-njxntsgc7z
-
MD5
3601472d942d7a893e015cbea6a2931b
-
SHA1
b57bf034b799265bbdc5ca6e269645fc2159c411
-
SHA256
f6087b5b38afaa2ea8da58c002ae713c100566b8c0545f051bd97e8c0d3e67e5
-
SHA512
8908796d8da86ec09b4688949ca2089eac111146359d531243294028bb6c97189355b4a440cc329346dd737e563ce48441015d0a0f85d83330bedfc19a9d2dc2
-
SSDEEP
49152:WCwsbCANnKXferL7Vwe/Gg0P+WhGwTC+D:hws2ANnKXOaeOgmhGwTC4
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Malware Config
Extracted
gh0strat
159.75.0.162
Targets
-
-
Target
tmp
-
Size
2.6MB
-
MD5
3601472d942d7a893e015cbea6a2931b
-
SHA1
b57bf034b799265bbdc5ca6e269645fc2159c411
-
SHA256
f6087b5b38afaa2ea8da58c002ae713c100566b8c0545f051bd97e8c0d3e67e5
-
SHA512
8908796d8da86ec09b4688949ca2089eac111146359d531243294028bb6c97189355b4a440cc329346dd737e563ce48441015d0a0f85d83330bedfc19a9d2dc2
-
SSDEEP
49152:WCwsbCANnKXferL7Vwe/Gg0P+WhGwTC+D:hws2ANnKXOaeOgmhGwTC4
-
Gh0st RAT payload
-
Modifies firewall policy service
-
Drops file in Drivers directory
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-