General
-
Target
zuixinaisi.msi.v
-
Size
233.8MB
-
Sample
240914-j3gz9svclf
-
MD5
df0ddca33d18cef60dbfdad992a21ff3
-
SHA1
5db0a225c9713d93412d01c5df5398811e54d1e5
-
SHA256
8e91a24111e14ac5cec2ee91633098ddc8606ee51d13b0c9d0f6087d597a189b
-
SHA512
e217e0425cb0045bc15e4ed5e122e69bd4d6bee5170e961659aba94641305f6a274d648529ec577df41fcca383085cf31e9df66123e433dd2f6a408aa407ceda
-
SSDEEP
6291456:/LGfwiT1I66Fm7gHvhjLvuYGpyLit5vFls1D:/cT1I6CFbopyLiLvyD
Static task
static1
Behavioral task
behavioral1
Sample
zuixinaisi.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
zuixinaisi.msi
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
zuixinaisi.msi.v
-
Size
233.8MB
-
MD5
df0ddca33d18cef60dbfdad992a21ff3
-
SHA1
5db0a225c9713d93412d01c5df5398811e54d1e5
-
SHA256
8e91a24111e14ac5cec2ee91633098ddc8606ee51d13b0c9d0f6087d597a189b
-
SHA512
e217e0425cb0045bc15e4ed5e122e69bd4d6bee5170e961659aba94641305f6a274d648529ec577df41fcca383085cf31e9df66123e433dd2f6a408aa407ceda
-
SSDEEP
6291456:/LGfwiT1I66Fm7gHvhjLvuYGpyLit5vFls1D:/cT1I6CFbopyLiLvyD
-
Gh0st RAT payload
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Event Triggered Execution
1Installer Packages
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1System Binary Proxy Execution
1Msiexec
1