General
-
Target
b701769b519c9bcb5651aa6f55a134099ea089c12b7b04a95b9da00446f4685b
-
Size
2.2MB
-
Sample
231116-d9d93afd73
-
MD5
74819fb3e509870275aa941cca16bd73
-
SHA1
147b4881600e353bf0d2cea2b311a45eca70a1fe
-
SHA256
b701769b519c9bcb5651aa6f55a134099ea089c12b7b04a95b9da00446f4685b
-
SHA512
8d69f8ceecb7fdc32892473be2e1d49c8df04d2f080158d7e192278acdcd1e46c85b55339144819d72d30a3d6d6c0f92f53d6fa5153238223924c0e22c3f280f
-
SSDEEP
24576:cBbCXPFMtY8gUOy9LHdcAgWIMz7b2bj84zQ:cNgUDdcA/48R
Static task
static1
Behavioral task
behavioral1
Sample
b701769b519c9bcb5651aa6f55a134099ea089c12b7b04a95b9da00446f4685b.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
b701769b519c9bcb5651aa6f55a134099ea089c12b7b04a95b9da00446f4685b.exe
Resource
win10v2004-20231020-en
Malware Config
Targets
-
-
Target
b701769b519c9bcb5651aa6f55a134099ea089c12b7b04a95b9da00446f4685b
-
Size
2.2MB
-
MD5
74819fb3e509870275aa941cca16bd73
-
SHA1
147b4881600e353bf0d2cea2b311a45eca70a1fe
-
SHA256
b701769b519c9bcb5651aa6f55a134099ea089c12b7b04a95b9da00446f4685b
-
SHA512
8d69f8ceecb7fdc32892473be2e1d49c8df04d2f080158d7e192278acdcd1e46c85b55339144819d72d30a3d6d6c0f92f53d6fa5153238223924c0e22c3f280f
-
SSDEEP
24576:cBbCXPFMtY8gUOy9LHdcAgWIMz7b2bj84zQ:cNgUDdcA/48R
Score10/10-
Gh0st RAT payload
-
Downloads MZ/PE file
-
Sets DLL path for service in the registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1