General
-
Target
mngboot.exe
-
Size
2.0MB
-
Sample
240423-jj2wbsef4w
-
MD5
2a5f4c6d957f37ecea115fffe6d28467
-
SHA1
9fe8436f8e1f6198b883404f0b59256b4f08bbed
-
SHA256
5058d869c59bfb3480d1dc6f8f51d191adb890039c89ff9fd668fe7b481099b8
-
SHA512
673861e0bb2c2a4a26a9ab0a34fee45aa48e26b0677fb1815c9cc79fb1520d81c75d63d27af69e7229d79823022c5ca78ab4b7dd0d74388e84a93ef789a04ba8
-
SSDEEP
49152:aVhyh5fVd/kOz40n4OdaVZsNz/Trp/HfaBa4kRQaddfZL17N:LY4rn4OdYiH9Qa/RLz
Static task
static1
Behavioral task
behavioral1
Sample
mngboot.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
mngboot.exe
-
Size
2.0MB
-
MD5
2a5f4c6d957f37ecea115fffe6d28467
-
SHA1
9fe8436f8e1f6198b883404f0b59256b4f08bbed
-
SHA256
5058d869c59bfb3480d1dc6f8f51d191adb890039c89ff9fd668fe7b481099b8
-
SHA512
673861e0bb2c2a4a26a9ab0a34fee45aa48e26b0677fb1815c9cc79fb1520d81c75d63d27af69e7229d79823022c5ca78ab4b7dd0d74388e84a93ef789a04ba8
-
SSDEEP
49152:aVhyh5fVd/kOz40n4OdaVZsNz/Trp/HfaBa4kRQaddfZL17N:LY4rn4OdYiH9Qa/RLz
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-