General
-
Target
60e6634fe10d96f5d3032503ea265f9d76766655ee68c120cdb0683a1d7aa50c
-
Size
1.4MB
-
Sample
240921-mjyqfsxgjn
-
MD5
4cb7bd6ccd252f5c48fa8fd1eec82b71
-
SHA1
89ea965e9af6cfbdf16fa6b31f9c5d13d7eef11c
-
SHA256
60e6634fe10d96f5d3032503ea265f9d76766655ee68c120cdb0683a1d7aa50c
-
SHA512
4e09af7c042a9f41b6a3ee78c8730de7f879a44400c35496d6456b49a4c544268e7e9cc73ce024fa5f7d486c2105f67420863d502eefbeffdb5ba9982251b9bc
-
SSDEEP
24576:F39WaOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:598HPkVOBTK
Static task
static1
Behavioral task
behavioral1
Sample
60e6634fe10d96f5d3032503ea265f9d76766655ee68c120cdb0683a1d7aa50c.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
60e6634fe10d96f5d3032503ea265f9d76766655ee68c120cdb0683a1d7aa50c
-
Size
1.4MB
-
MD5
4cb7bd6ccd252f5c48fa8fd1eec82b71
-
SHA1
89ea965e9af6cfbdf16fa6b31f9c5d13d7eef11c
-
SHA256
60e6634fe10d96f5d3032503ea265f9d76766655ee68c120cdb0683a1d7aa50c
-
SHA512
4e09af7c042a9f41b6a3ee78c8730de7f879a44400c35496d6456b49a4c544268e7e9cc73ce024fa5f7d486c2105f67420863d502eefbeffdb5ba9982251b9bc
-
SSDEEP
24576:F39WaOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:598HPkVOBTK
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1