General
-
Target
BoosterX.exe
-
Size
33.2MB
-
Sample
240513-xw3v2sbb74
-
MD5
8a5510bea4ccd744c30cc7338a2144c1
-
SHA1
8e96a6e02e5f4da4c5f1bcf60ea402eee4f5be94
-
SHA256
9d0b6ae05c845ce78318d91b514b46947b2e6f37ffb368a1cefee77ad63faee5
-
SHA512
a81d5d63d66b508144888f43c9898aaeda88382d9ede39ae8df74114908a0fcf165d62eafd9454dd23887229d366a012faada248e981926e7d1b4b696454476f
-
SSDEEP
786432:jU/dOrreYCXTZnV2LWrNgwoHNaBy7Dy5ncHkiTSct9:A1OfeZXTZnV2KrMHNj7DDHki1
Static task
static1
Behavioral task
behavioral1
Sample
BoosterX.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
BoosterX.exe
Resource
win11-20240426-en
Malware Config
Targets
-
-
Target
BoosterX.exe
-
Size
33.2MB
-
MD5
8a5510bea4ccd744c30cc7338a2144c1
-
SHA1
8e96a6e02e5f4da4c5f1bcf60ea402eee4f5be94
-
SHA256
9d0b6ae05c845ce78318d91b514b46947b2e6f37ffb368a1cefee77ad63faee5
-
SHA512
a81d5d63d66b508144888f43c9898aaeda88382d9ede39ae8df74114908a0fcf165d62eafd9454dd23887229d366a012faada248e981926e7d1b4b696454476f
-
SSDEEP
786432:jU/dOrreYCXTZnV2LWrNgwoHNaBy7Dy5ncHkiTSct9:A1OfeZXTZnV2KrMHNj7DDHki1
-
Detect ZGRat V2
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Possible privilege escalation attempt
-
Drops startup file
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1