General
-
Target
ChromeSetup_1.msi.v
-
Size
19.6MB
-
Sample
241003-g94fqszajp
-
MD5
60c37ac65e53ba837822c42debbccb21
-
SHA1
53dcb7a068ef330bf7b685128b1ed62004ec848a
-
SHA256
4919a15c3de7bcc2b79073d559909837caac6ef0a732cf3c6dfcc162b0e678eb
-
SHA512
1ef5b8b017857a8208392db2d9a9723163167313f818b35db82fadd361a61759a981fcc8b334937b34add3a086f06f3bb62019fbdc0553240654d0c232a0170e
-
SSDEEP
393216:VQ0Frf5krXSujsG+tn43vEZMBsvuSqqVBRALiJ7AAP9dmkLQFH78RXzQ9fjN:VQ05JQsG+54s0t7KR37AAPfrLQFgRXzA
Static task
static1
Behavioral task
behavioral1
Sample
ChromeSetup_1.msi
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
ChromeSetup_1.msi.v
-
Size
19.6MB
-
MD5
60c37ac65e53ba837822c42debbccb21
-
SHA1
53dcb7a068ef330bf7b685128b1ed62004ec848a
-
SHA256
4919a15c3de7bcc2b79073d559909837caac6ef0a732cf3c6dfcc162b0e678eb
-
SHA512
1ef5b8b017857a8208392db2d9a9723163167313f818b35db82fadd361a61759a981fcc8b334937b34add3a086f06f3bb62019fbdc0553240654d0c232a0170e
-
SSDEEP
393216:VQ0Frf5krXSujsG+tn43vEZMBsvuSqqVBRALiJ7AAP9dmkLQFH78RXzQ9fjN:VQ05JQsG+54s0t7KR37AAPfrLQFgRXzA
-
Gh0st RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
2Component Object Model Hijacking
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
2Component Object Model Hijacking
1Installer Packages
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1