General
-
Target
fec4bc02d6327dfe396635b87b642cfd5d4fbcfbf951e23b3e2dfd839285b382
-
Size
2.0MB
-
Sample
240925-eltkhstgpl
-
MD5
2d47c5dfafadd7c7974be14370517fc0
-
SHA1
a4ca61746045adc930dac56179e589b9696b641f
-
SHA256
fec4bc02d6327dfe396635b87b642cfd5d4fbcfbf951e23b3e2dfd839285b382
-
SHA512
eebaefda6914c2d8b8c1ff8c112c2f217910412e43a801cffb0df11a7d9849a654cbdf13e3b83cd669e2afd75693841da707f088a47089269d2822654dcd90ed
-
SSDEEP
49152:bM8kreqST3gNH92gVmc//////ZTVJ50BSRc0OlYouOP8GPhLZB:se53gNH92gVmc///////J5pW0Qui8GPt
Static task
static1
Behavioral task
behavioral1
Sample
fec4bc02d6327dfe396635b87b642cfd5d4fbcfbf951e23b3e2dfd839285b382.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
fec4bc02d6327dfe396635b87b642cfd5d4fbcfbf951e23b3e2dfd839285b382
-
Size
2.0MB
-
MD5
2d47c5dfafadd7c7974be14370517fc0
-
SHA1
a4ca61746045adc930dac56179e589b9696b641f
-
SHA256
fec4bc02d6327dfe396635b87b642cfd5d4fbcfbf951e23b3e2dfd839285b382
-
SHA512
eebaefda6914c2d8b8c1ff8c112c2f217910412e43a801cffb0df11a7d9849a654cbdf13e3b83cd669e2afd75693841da707f088a47089269d2822654dcd90ed
-
SSDEEP
49152:bM8kreqST3gNH92gVmc//////ZTVJ50BSRc0OlYouOP8GPhLZB:se53gNH92gVmc///////J5pW0Qui8GPt
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1