General
-
Target
4414d39324196360367a934b6688217c0bac33e6ded0f3caf3230807aef1f266
-
Size
3.1MB
-
Sample
240914-rjdgqsybnd
-
MD5
dce569b267db7d4de08c4732675a1d65
-
SHA1
a91040cef744dd45cb58b7bb7b39a9da9bad8a28
-
SHA256
4414d39324196360367a934b6688217c0bac33e6ded0f3caf3230807aef1f266
-
SHA512
689d90a11cb8a63e058ed70248861c3471a2f6fa6d3d66b2df046207bcc5ce06935d0f086716f3165ffabe666680a5435409e65b237bb3710433e1540cdbc8d3
-
SSDEEP
98304:JGdVyVT9nOgmhIQp45YUvcf5YcLLEcTiw:WWT9nO7mF8fSYBr
Static task
static1
Behavioral task
behavioral1
Sample
4414d39324196360367a934b6688217c0bac33e6ded0f3caf3230807aef1f266.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
4414d39324196360367a934b6688217c0bac33e6ded0f3caf3230807aef1f266
-
Size
3.1MB
-
MD5
dce569b267db7d4de08c4732675a1d65
-
SHA1
a91040cef744dd45cb58b7bb7b39a9da9bad8a28
-
SHA256
4414d39324196360367a934b6688217c0bac33e6ded0f3caf3230807aef1f266
-
SHA512
689d90a11cb8a63e058ed70248861c3471a2f6fa6d3d66b2df046207bcc5ce06935d0f086716f3165ffabe666680a5435409e65b237bb3710433e1540cdbc8d3
-
SSDEEP
98304:JGdVyVT9nOgmhIQp45YUvcf5YcLLEcTiw:WWT9nO7mF8fSYBr
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1