General
-
Target
0dd6d189ab0a47cbfcef1d09283bbf52cb71029cb079ada2f1c52227d22a80f4
-
Size
3.0MB
-
Sample
240526-j1qvdsca5w
-
MD5
d130725ca7506894910504571f9ec162
-
SHA1
e347b77c19d59a155ab46ebcc2701bc31eb3fc58
-
SHA256
0dd6d189ab0a47cbfcef1d09283bbf52cb71029cb079ada2f1c52227d22a80f4
-
SHA512
928e2a365fce813838f2c2bfb6e46866dbd97731f988b3d5537babd51bbb77da24370deaa9eb295b7196695ec6a5935562a49ffe84a65bc7f2f20988a3085de2
-
SSDEEP
49152:P09XJt4HIN2H2tFvduyS0E3d5ZQ1rxJ+:cZJt4HINy2Lk0E3d5Za
Static task
static1
Behavioral task
behavioral1
Sample
0dd6d189ab0a47cbfcef1d09283bbf52cb71029cb079ada2f1c52227d22a80f4.exe
Resource
win7-20240419-en
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
1.15.12.73:4567
Targets
-
-
Target
0dd6d189ab0a47cbfcef1d09283bbf52cb71029cb079ada2f1c52227d22a80f4
-
Size
3.0MB
-
MD5
d130725ca7506894910504571f9ec162
-
SHA1
e347b77c19d59a155ab46ebcc2701bc31eb3fc58
-
SHA256
0dd6d189ab0a47cbfcef1d09283bbf52cb71029cb079ada2f1c52227d22a80f4
-
SHA512
928e2a365fce813838f2c2bfb6e46866dbd97731f988b3d5537babd51bbb77da24370deaa9eb295b7196695ec6a5935562a49ffe84a65bc7f2f20988a3085de2
-
SSDEEP
49152:P09XJt4HIN2H2tFvduyS0E3d5ZQ1rxJ+:cZJt4HINy2Lk0E3d5Za
-
Gh0st RAT payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-