General
-
Target
GH0ST.exe
-
Size
127KB
-
Sample
240330-rnj53sgh98
-
MD5
90b828929de1319e5b9bf94f4ae990b3
-
SHA1
8fc41267cfb9f057e78beca15b775d20fb01434b
-
SHA256
14592b6ee58e6c1abe76e8148f087b1da84f54892b1cca31540dd728298bb185
-
SHA512
57e50e8c3e424980bfb96d4d1862e998efd50e45df25478fc80537a67a27b8d7aa8cce00400e0126216395205946a38876a2ff494b74d86043c5e5779a4b5921
-
SSDEEP
3072:oDk4Rq96liXWAPEV9Ue4znvqg2WVrxuF:h4Rq9UCW7WhZx
Behavioral task
behavioral1
Sample
GH0ST.exe
Resource
win7-20240221-en
Malware Config
Extracted
C:\ProgramData\Adobe\Updater6\read_it.txt
Targets
-
-
Target
GH0ST.exe
-
Size
127KB
-
MD5
90b828929de1319e5b9bf94f4ae990b3
-
SHA1
8fc41267cfb9f057e78beca15b775d20fb01434b
-
SHA256
14592b6ee58e6c1abe76e8148f087b1da84f54892b1cca31540dd728298bb185
-
SHA512
57e50e8c3e424980bfb96d4d1862e998efd50e45df25478fc80537a67a27b8d7aa8cce00400e0126216395205946a38876a2ff494b74d86043c5e5779a4b5921
-
SSDEEP
3072:oDk4Rq96liXWAPEV9Ue4znvqg2WVrxuF:h4Rq9UCW7WhZx
Score10/10-
Chaos Ransomware
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-