General
-
Target
c95f34c2d2acd9ea5954c369fab97f0dc4d004e0e3d09b9c409e116d1ec460e8
-
Size
11.9MB
-
Sample
240821-z7mpba1dpa
-
MD5
0d33913347c1579916f9a47ad5f0dfad
-
SHA1
3dce11c1b0da7753e6b1e4cbf764a2cb8b479db4
-
SHA256
c95f34c2d2acd9ea5954c369fab97f0dc4d004e0e3d09b9c409e116d1ec460e8
-
SHA512
82841e9e04a2b6b4cbecc110d2afd3eb3b9a9279d6d142bda0371f1659d98c67a0fab01c4049bc7d0720a936dd9de683b21dd3bcb6189054a3c0c0c80c2c8b31
-
SSDEEP
196608:MB0Bmpz+HjgXS5z59BXKKUWbMBrt86mCUPsNl+oHNJ9wlv:PBmpzbXSb98KfkrK6Jj+otolv
Static task
static1
Behavioral task
behavioral1
Sample
c95f34c2d2acd9ea5954c369fab97f0dc4d004e0e3d09b9c409e116d1ec460e8.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
c95f34c2d2acd9ea5954c369fab97f0dc4d004e0e3d09b9c409e116d1ec460e8
-
Size
11.9MB
-
MD5
0d33913347c1579916f9a47ad5f0dfad
-
SHA1
3dce11c1b0da7753e6b1e4cbf764a2cb8b479db4
-
SHA256
c95f34c2d2acd9ea5954c369fab97f0dc4d004e0e3d09b9c409e116d1ec460e8
-
SHA512
82841e9e04a2b6b4cbecc110d2afd3eb3b9a9279d6d142bda0371f1659d98c67a0fab01c4049bc7d0720a936dd9de683b21dd3bcb6189054a3c0c0c80c2c8b31
-
SSDEEP
196608:MB0Bmpz+HjgXS5z59BXKKUWbMBrt86mCUPsNl+oHNJ9wlv:PBmpzbXSb98KfkrK6Jj+otolv
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1