General
-
Target
2ba3b3a610926aca34426f3cd8a03f0d65e6c50d2d54db679ef18d021dc06bb0
-
Size
1.2MB
-
Sample
240908-mjzmra1dmj
-
MD5
1ab96f3b8513fb6ba7593e5ebd5b5292
-
SHA1
35bc39a2a0ec2b75f0d1a3945954ba9ec96b3a6a
-
SHA256
2ba3b3a610926aca34426f3cd8a03f0d65e6c50d2d54db679ef18d021dc06bb0
-
SHA512
95eb04287d0b1799c12108f789865682c6ed13f824d7fe03b8690118b6a5e184b67a69f97d6535104e643d14bebb4bcf2ead54bd59fe28e975d2ac1164653d2e
-
SSDEEP
24576:9WnukjaDKSnYBzaJbjSoGF9LzpELx3N/nHwhHK28URjX+a:MnTjaD/9v6Vcx9HwNhua
Behavioral task
behavioral1
Sample
2ba3b3a610926aca34426f3cd8a03f0d65e6c50d2d54db679ef18d021dc06bb0.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2ba3b3a610926aca34426f3cd8a03f0d65e6c50d2d54db679ef18d021dc06bb0
-
Size
1.2MB
-
MD5
1ab96f3b8513fb6ba7593e5ebd5b5292
-
SHA1
35bc39a2a0ec2b75f0d1a3945954ba9ec96b3a6a
-
SHA256
2ba3b3a610926aca34426f3cd8a03f0d65e6c50d2d54db679ef18d021dc06bb0
-
SHA512
95eb04287d0b1799c12108f789865682c6ed13f824d7fe03b8690118b6a5e184b67a69f97d6535104e643d14bebb4bcf2ead54bd59fe28e975d2ac1164653d2e
-
SSDEEP
24576:9WnukjaDKSnYBzaJbjSoGF9LzpELx3N/nHwhHK28URjX+a:MnTjaD/9v6Vcx9HwNhua
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2