General
-
Target
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74
-
Size
3.9MB
-
Sample
240418-pfxebsda25
-
MD5
68ae6ccb3c5a879ea7d350372fe1f637
-
SHA1
fda8df32fac91f400aebc9f1f12fe2b7874c41c4
-
SHA256
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74
-
SHA512
aa8741fba30bfe5a1c6e7fe357d719f67b66c1348f0f6072b2cc96d0b4cccf5f982a0979aa5b46bb2c7a9310d6904cc5f0357ecd6b053b607946704ab6ad7fdc
-
SSDEEP
98304:Yws2ANlKXOaeOgmhIFValfyCwwDK4F0Fc:O0XbeO75OK
Static task
static1
Behavioral task
behavioral1
Sample
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74.exe
Resource
win7-20240215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74
-
Size
3.9MB
-
MD5
68ae6ccb3c5a879ea7d350372fe1f637
-
SHA1
fda8df32fac91f400aebc9f1f12fe2b7874c41c4
-
SHA256
c3036a32460ece48445924f49c350e3efb7e136fe6b6f569320bea45fc383f74
-
SHA512
aa8741fba30bfe5a1c6e7fe357d719f67b66c1348f0f6072b2cc96d0b4cccf5f982a0979aa5b46bb2c7a9310d6904cc5f0357ecd6b053b607946704ab6ad7fdc
-
SSDEEP
98304:Yws2ANlKXOaeOgmhIFValfyCwwDK4F0Fc:O0XbeO75OK
-
Gh0st RAT payload
-
Modifies firewall policy service
-
Drops file in Drivers directory
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Modify Registry
7Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3