General
-
Target
WPS-0A6AB1D6FA31sshortcuts-custom.exe
-
Size
67.7MB
-
Sample
230827-tn3njabd53
-
MD5
c01e7f9022cd6d91aa06881229383f31
-
SHA1
631b5ba15d4fe42b812436b8f12ee33018219d34
-
SHA256
5be1288b17f208477e60a1a398e42fb718f1767e7f79e2979996c79192e5e775
-
SHA512
21a3933e1776676960557cb092cc3bf8bd1037287053767a18b47f04580308a46355f199c1fe97c8b8a813491d58f769040c96d97a2b7a9c6dca397cf91ef45f
-
SSDEEP
1572864:83Mo59ulmbjAa91+FggUhx2HI+8h1QYkXmj6hbBeCVCqU:83/0QAau1qw88XmOBeuxU
Static task
static1
Behavioral task
behavioral1
Sample
WPS-0A6AB1D6FA31sshortcuts-custom.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
WPS-0A6AB1D6FA31sshortcuts-custom.exe
Resource
win10-20230703-en
Malware Config
Targets
-
-
Target
WPS-0A6AB1D6FA31sshortcuts-custom.exe
-
Size
67.7MB
-
MD5
c01e7f9022cd6d91aa06881229383f31
-
SHA1
631b5ba15d4fe42b812436b8f12ee33018219d34
-
SHA256
5be1288b17f208477e60a1a398e42fb718f1767e7f79e2979996c79192e5e775
-
SHA512
21a3933e1776676960557cb092cc3bf8bd1037287053767a18b47f04580308a46355f199c1fe97c8b8a813491d58f769040c96d97a2b7a9c6dca397cf91ef45f
-
SSDEEP
1572864:83Mo59ulmbjAa91+FggUhx2HI+8h1QYkXmj6hbBeCVCqU:83/0QAau1qw88XmOBeuxU
-
Gh0st RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3