General
-
Target
TGSetup4.2x64.exe
-
Size
96.6MB
-
Sample
231103-ssy1gafh67
-
MD5
7cc0e4de3ade2fb36ba6ff823334a7de
-
SHA1
b460aa34ec4cf92ca354d8e6b5535d05f8ca96f6
-
SHA256
8620bceae6df2d39248b05ff78a7213e27466c9204b791aee93155612ca9f311
-
SHA512
7086971b3df61368ed0bda46022436a22cce4590d5e13e2662104c2f9a81bf7967271627ddfbb3a23685e06ccc81622d221fb3b78066d6951ed8dbca0ec7036e
-
SSDEEP
3145728:k/rum2oEAI1q41beObGzXEz9+Dr/80rC0p:er72oT+eObGAMDrkFy
Static task
static1
Behavioral task
behavioral1
Sample
TGSetup4.2x64.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
TGSetup4.2x64.exe
Resource
win10-20231023-en
Malware Config
Targets
-
-
Target
TGSetup4.2x64.exe
-
Size
96.6MB
-
MD5
7cc0e4de3ade2fb36ba6ff823334a7de
-
SHA1
b460aa34ec4cf92ca354d8e6b5535d05f8ca96f6
-
SHA256
8620bceae6df2d39248b05ff78a7213e27466c9204b791aee93155612ca9f311
-
SHA512
7086971b3df61368ed0bda46022436a22cce4590d5e13e2662104c2f9a81bf7967271627ddfbb3a23685e06ccc81622d221fb3b78066d6951ed8dbca0ec7036e
-
SSDEEP
3145728:k/rum2oEAI1q41beObGzXEz9+Dr/80rC0p:er72oT+eObGAMDrkFy
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
1