General
-
Target
7ae098ad9f95ebedb2b11a5c201ce0e4cf0561349332375d398b79c262f07f00
-
Size
611KB
-
Sample
240930-h34zcssckj
-
MD5
6fa0005ec0a80e557577b4bb6a96247d
-
SHA1
729280eb0028c31d2b8ce78d5ea8e7c9581bb5f8
-
SHA256
7ae098ad9f95ebedb2b11a5c201ce0e4cf0561349332375d398b79c262f07f00
-
SHA512
4efb517afa7c7fad178df972c95df8e37fa65dfb5611e61bdc10045a05fcc677e1cbd68a2563ca5504741d0a81dd20ebf95fe017d2396c402cb04f580876c016
-
SSDEEP
12288:tFpuzZSkcBNrl5mTEUkDaSdJfpSaoNRVBUyMCe8VMM80B7qrI3iK1XBwZQmm:tFmShDrngEUkDaiJfpSaoNRpMCe8CM8i
Behavioral task
behavioral1
Sample
7ae098ad9f95ebedb2b11a5c201ce0e4cf0561349332375d398b79c262f07f00.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
7ae098ad9f95ebedb2b11a5c201ce0e4cf0561349332375d398b79c262f07f00
-
Size
611KB
-
MD5
6fa0005ec0a80e557577b4bb6a96247d
-
SHA1
729280eb0028c31d2b8ce78d5ea8e7c9581bb5f8
-
SHA256
7ae098ad9f95ebedb2b11a5c201ce0e4cf0561349332375d398b79c262f07f00
-
SHA512
4efb517afa7c7fad178df972c95df8e37fa65dfb5611e61bdc10045a05fcc677e1cbd68a2563ca5504741d0a81dd20ebf95fe017d2396c402cb04f580876c016
-
SSDEEP
12288:tFpuzZSkcBNrl5mTEUkDaSdJfpSaoNRVBUyMCe8VMM80B7qrI3iK1XBwZQmm:tFmShDrngEUkDaiJfpSaoNRpMCe8CM8i
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1