General
-
Target
Ghostpress.zip
-
Size
7.3MB
-
Sample
240719-we5smssflp
-
MD5
4a2fe69e24454bc45cdf7cb4c5d16614
-
SHA1
3acf8e808f003f8f62b8a8b90afa4ab3238aaa17
-
SHA256
bba117558703b80e9e3dec401f3de3989b8ce720e4f5fe07e82a253be6e129fb
-
SHA512
23dc963a9e245037d757070f52809f7b6c865f612e1c5803f3f07ac92eec4f7398d40b682de1e076b7ea7a2d42df98d297d5f6c0f6d9c5fdfccb3d2b1c14dc35
-
SSDEEP
196608:g9fiuy15gdcTpiC6gvxd64f8goVib6yTJXggVKPOJ9:4fiuyCGsC6s3f8Pc1QgV689
Static task
static1
Behavioral task
behavioral1
Sample
Ghostpress.zip
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
Ghostpress.zip
-
Size
7.3MB
-
MD5
4a2fe69e24454bc45cdf7cb4c5d16614
-
SHA1
3acf8e808f003f8f62b8a8b90afa4ab3238aaa17
-
SHA256
bba117558703b80e9e3dec401f3de3989b8ce720e4f5fe07e82a253be6e129fb
-
SHA512
23dc963a9e245037d757070f52809f7b6c865f612e1c5803f3f07ac92eec4f7398d40b682de1e076b7ea7a2d42df98d297d5f6c0f6d9c5fdfccb3d2b1c14dc35
-
SSDEEP
196608:g9fiuy15gdcTpiC6gvxd64f8goVib6yTJXggVKPOJ9:4fiuyCGsC6s3f8Pc1QgV689
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Accessibility Features
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Accessibility Features
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1