General
-
Target
W-p-s-X.6.4.exe
-
Size
103.4MB
-
Sample
230828-eg6z2shc8w
-
MD5
5fbe99e528572de675c72bfb3102584a
-
SHA1
0e04c5bb38a47cf0eca9120d7e8637c1114c83b2
-
SHA256
d90cd579e5d990d15167cb85f288b85cd50af5e1b195ecbb0d9848b7e0abbbaf
-
SHA512
b8faa21e4d6eacee27a4ca6eff0cbb4ea1dbe2250c7398d757fc7cf60d4d0764490253fc0ee68728e8bdaf0ca59b9bc6e7a48247d4560513e327bdd5e3a0cdfb
-
SSDEEP
3145728:whd03L6sBGn66jS6ZQJ5r4b9s0rhDbV1MdlKI2JFOhbA:8UDBG66jS6ST101nVckI2DOhbA
Static task
static1
Behavioral task
behavioral1
Sample
W-p-s-X.6.4.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
W-p-s-X.6.4.exe
Resource
win10-20230703-en
Malware Config
Targets
-
-
Target
W-p-s-X.6.4.exe
-
Size
103.4MB
-
MD5
5fbe99e528572de675c72bfb3102584a
-
SHA1
0e04c5bb38a47cf0eca9120d7e8637c1114c83b2
-
SHA256
d90cd579e5d990d15167cb85f288b85cd50af5e1b195ecbb0d9848b7e0abbbaf
-
SHA512
b8faa21e4d6eacee27a4ca6eff0cbb4ea1dbe2250c7398d757fc7cf60d4d0764490253fc0ee68728e8bdaf0ca59b9bc6e7a48247d4560513e327bdd5e3a0cdfb
-
SSDEEP
3145728:whd03L6sBGn66jS6ZQJ5r4b9s0rhDbV1MdlKI2JFOhbA:8UDBG66jS6ST101nVckI2DOhbA
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
1