General
-
Target
665c6ad7a4b12b9ebdfd32631c0872e0d30e5d01fbddf5372a4605393cb9a9f3
-
Size
1.2MB
-
Sample
241014-vv65zazhnp
-
MD5
6366cba2a436ae3d26c1ac06df299eac
-
SHA1
d734689319b0acb0a7347a8dc85b348251e90b1e
-
SHA256
665c6ad7a4b12b9ebdfd32631c0872e0d30e5d01fbddf5372a4605393cb9a9f3
-
SHA512
5b69abd652de4fb7e9f6b089a532c789dcf099c70f862c5a8d4409b748fa09cd56596113826e26caa98befde74d76fa2c4f3451a28d32c7e8cebb17925c13036
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtie:WIwgMEuy+inDfp3/XoCw57XYBwKe
Behavioral task
behavioral1
Sample
665c6ad7a4b12b9ebdfd32631c0872e0d30e5d01fbddf5372a4605393cb9a9f3.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
665c6ad7a4b12b9ebdfd32631c0872e0d30e5d01fbddf5372a4605393cb9a9f3
-
Size
1.2MB
-
MD5
6366cba2a436ae3d26c1ac06df299eac
-
SHA1
d734689319b0acb0a7347a8dc85b348251e90b1e
-
SHA256
665c6ad7a4b12b9ebdfd32631c0872e0d30e5d01fbddf5372a4605393cb9a9f3
-
SHA512
5b69abd652de4fb7e9f6b089a532c789dcf099c70f862c5a8d4409b748fa09cd56596113826e26caa98befde74d76fa2c4f3451a28d32c7e8cebb17925c13036
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtie:WIwgMEuy+inDfp3/XoCw57XYBwKe
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2