General
-
Target
76dd22dbd916ffbac43c217e3dafbf3b679661a27eb3eb386faf7ca2a66b130a
-
Size
611KB
-
Sample
240916-nsppksvhjg
-
MD5
741f2f27f0137457c558e30aef69224a
-
SHA1
abe5234a06913705b1d9c891e9d3603fbaf68e58
-
SHA256
76dd22dbd916ffbac43c217e3dafbf3b679661a27eb3eb386faf7ca2a66b130a
-
SHA512
2ac0d2ee60f5ae40f6e43b0abeb9f542b3bab8ea18692d799ffc2e684bbcdcd4539bc82ac8d091e82a1d8a211af3a03d94f8d06d835bb5c03dd471da3076a3ab
-
SSDEEP
12288:FFpuzZSkcBNrl5mTEUkDaSdJfpSaoNRVBUyMCe8VMM80B7qrI3iK1XBwZQp:FFmShDrngEUkDaiJfpSaoNRpMCe8CM8W
Behavioral task
behavioral1
Sample
76dd22dbd916ffbac43c217e3dafbf3b679661a27eb3eb386faf7ca2a66b130a.exe
Resource
win7-20240903-en
Malware Config
Extracted
gh0strat
206.238.179.179
Targets
-
-
Target
76dd22dbd916ffbac43c217e3dafbf3b679661a27eb3eb386faf7ca2a66b130a
-
Size
611KB
-
MD5
741f2f27f0137457c558e30aef69224a
-
SHA1
abe5234a06913705b1d9c891e9d3603fbaf68e58
-
SHA256
76dd22dbd916ffbac43c217e3dafbf3b679661a27eb3eb386faf7ca2a66b130a
-
SHA512
2ac0d2ee60f5ae40f6e43b0abeb9f542b3bab8ea18692d799ffc2e684bbcdcd4539bc82ac8d091e82a1d8a211af3a03d94f8d06d835bb5c03dd471da3076a3ab
-
SSDEEP
12288:FFpuzZSkcBNrl5mTEUkDaSdJfpSaoNRVBUyMCe8VMM80B7qrI3iK1XBwZQp:FFmShDrngEUkDaiJfpSaoNRpMCe8CM8W
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1