General
-
Target
0813cc1890daa309d46c9d3553f64d6e072bea061bb4af88b5141b550dee0182
-
Size
1.4MB
-
Sample
240817-kapebayhmj
-
MD5
16ee54534c64f27f83761954d41e4368
-
SHA1
c3a54b4f79397904ad093971078c979cfda6d4b6
-
SHA256
0813cc1890daa309d46c9d3553f64d6e072bea061bb4af88b5141b550dee0182
-
SHA512
2ea86f439a0b07d978aa7405efb6a444539844e7525304b9db063126eb94fa377b2dc63ef79186c1724d7d01c4dba2a572b81d136aded16e3b5a9e098e1feab2
-
SSDEEP
24576:EQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVkraBN:EQZAdVyVT9n/Gg0P+WhoY
Static task
static1
Behavioral task
behavioral1
Sample
0813cc1890daa309d46c9d3553f64d6e072bea061bb4af88b5141b550dee0182.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
0813cc1890daa309d46c9d3553f64d6e072bea061bb4af88b5141b550dee0182
-
Size
1.4MB
-
MD5
16ee54534c64f27f83761954d41e4368
-
SHA1
c3a54b4f79397904ad093971078c979cfda6d4b6
-
SHA256
0813cc1890daa309d46c9d3553f64d6e072bea061bb4af88b5141b550dee0182
-
SHA512
2ea86f439a0b07d978aa7405efb6a444539844e7525304b9db063126eb94fa377b2dc63ef79186c1724d7d01c4dba2a572b81d136aded16e3b5a9e098e1feab2
-
SSDEEP
24576:EQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVkraBN:EQZAdVyVT9n/Gg0P+WhoY
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1