General
-
Target
b74d0f3aaf6710772e17ed0c9334c10bb49eecd101b6e99d50227f3344fd5636
-
Size
1.5MB
-
Sample
240816-m8q2xa1ekd
-
MD5
a9be31f871bca412603622e2892566a8
-
SHA1
4c06980c3b2d26e5ea02f0aa947d2643701e6879
-
SHA256
b74d0f3aaf6710772e17ed0c9334c10bb49eecd101b6e99d50227f3344fd5636
-
SHA512
ac8293e5aa4f191af9b99b151d9c5d69f3207146cafed38bd58fca8f2f9f0c03cedf1890ef0435fb609c2e450086a19bd2d3e6857a4c2edfb845fa2c10a3b37f
-
SSDEEP
24576:Ii2Tro2H2HESq2eWJ6MQjySjyegRRRRRRRRRRRRRRRRRRR5RRRRRRRRPTulOcsVM:IxTc2H2tFvduySdgRRRRRRRRRRRRRRRw
Behavioral task
behavioral1
Sample
b74d0f3aaf6710772e17ed0c9334c10bb49eecd101b6e99d50227f3344fd5636.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
b74d0f3aaf6710772e17ed0c9334c10bb49eecd101b6e99d50227f3344fd5636
-
Size
1.5MB
-
MD5
a9be31f871bca412603622e2892566a8
-
SHA1
4c06980c3b2d26e5ea02f0aa947d2643701e6879
-
SHA256
b74d0f3aaf6710772e17ed0c9334c10bb49eecd101b6e99d50227f3344fd5636
-
SHA512
ac8293e5aa4f191af9b99b151d9c5d69f3207146cafed38bd58fca8f2f9f0c03cedf1890ef0435fb609c2e450086a19bd2d3e6857a4c2edfb845fa2c10a3b37f
-
SSDEEP
24576:Ii2Tro2H2HESq2eWJ6MQjySjyegRRRRRRRRRRRRRRRRRRR5RRRRRRRRPTulOcsVM:IxTc2H2tFvduySdgRRRRRRRRRRRRRRRw
-
Gh0st RAT payload
-
mimikatz is an open source tool to dump credentials on Windows
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1