General
-
Target
bba6a9f67d0f2acaf56fe23f57fb25fc69b5e5c60c055c270ebe37132b2c0758
-
Size
1.4MB
-
Sample
240830-kpgm1svfpf
-
MD5
17d6005210c6f1aa227ad335c1f9bc5a
-
SHA1
6bcf515221fa800399f2128be4f539ba99dcedf4
-
SHA256
bba6a9f67d0f2acaf56fe23f57fb25fc69b5e5c60c055c270ebe37132b2c0758
-
SHA512
a4449c841a1fb0b3761afb68a8f55a8554bd55dc4607afe19ad8746704353936964be3c62453a26529035bccd76b0b216d4134a8d2026676eb619b02ac3566d4
-
SSDEEP
24576:F39WaOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:598HPkVOBTK
Static task
static1
Behavioral task
behavioral1
Sample
bba6a9f67d0f2acaf56fe23f57fb25fc69b5e5c60c055c270ebe37132b2c0758.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
bba6a9f67d0f2acaf56fe23f57fb25fc69b5e5c60c055c270ebe37132b2c0758
-
Size
1.4MB
-
MD5
17d6005210c6f1aa227ad335c1f9bc5a
-
SHA1
6bcf515221fa800399f2128be4f539ba99dcedf4
-
SHA256
bba6a9f67d0f2acaf56fe23f57fb25fc69b5e5c60c055c270ebe37132b2c0758
-
SHA512
a4449c841a1fb0b3761afb68a8f55a8554bd55dc4607afe19ad8746704353936964be3c62453a26529035bccd76b0b216d4134a8d2026676eb619b02ac3566d4
-
SSDEEP
24576:F39WaOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:598HPkVOBTK
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1