General
-
Target
0ebfef7d6059b82e87e05a54e80e5a7b.virus
-
Size
2.6MB
-
Sample
240916-yw6sdaxemh
-
MD5
0ebfef7d6059b82e87e05a54e80e5a7b
-
SHA1
3c1ab9c072625b9e08b72013967b04bd2e0cb69e
-
SHA256
4695fbf41abd54d1449d8da4a5976d50aec0499e3e2959e20686237d32db3114
-
SHA512
a695816e77c3d569ba861fab022035910858cf2db0e15dd2a58398c6f39394add35172ca209de1d0d02019f5f0a4f35beb8e3ea56c4e0c37cb645379d1d9e5c9
-
SSDEEP
24576:3bsATQUIP6braCWyv6BpHv+LOez9OulOcsV9DK2J2aBcpsam5RvikgJkf:3vbDCv+HOulOcQMYYsP5RviP6
Behavioral task
behavioral1
Sample
0ebfef7d6059b82e87e05a54e80e5a7b.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0ebfef7d6059b82e87e05a54e80e5a7b.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
0ebfef7d6059b82e87e05a54e80e5a7b.virus
-
Size
2.6MB
-
MD5
0ebfef7d6059b82e87e05a54e80e5a7b
-
SHA1
3c1ab9c072625b9e08b72013967b04bd2e0cb69e
-
SHA256
4695fbf41abd54d1449d8da4a5976d50aec0499e3e2959e20686237d32db3114
-
SHA512
a695816e77c3d569ba861fab022035910858cf2db0e15dd2a58398c6f39394add35172ca209de1d0d02019f5f0a4f35beb8e3ea56c4e0c37cb645379d1d9e5c9
-
SSDEEP
24576:3bsATQUIP6braCWyv6BpHv+LOez9OulOcsV9DK2J2aBcpsam5RvikgJkf:3vbDCv+HOulOcQMYYsP5RviP6
-
Gh0st RAT payload
-
mimikatz is an open source tool to dump credentials on Windows
-
Blocklisted process makes network request
-
Server Software Component: Terminal Services DLL
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3