General
-
Target
c8a7377c2b54ff59408f5307d84522e5f457f16a172cfcef7430f35a96ab15bd
-
Size
3.8MB
-
Sample
241015-ybv55stajg
-
MD5
64ad45da27634136c56751119efb70e7
-
SHA1
c5e5684d80dddf7c19b22880fbc5559124333640
-
SHA256
c8a7377c2b54ff59408f5307d84522e5f457f16a172cfcef7430f35a96ab15bd
-
SHA512
ad1efe41941981fbd539d6dd016faa62617fe428754b80410c1aa425a224f1947d76ac5910cf6019e9eb11122b5622d0bf097a5113390e1d454019b87dc840c5
-
SSDEEP
49152:RCwsbCANnKXferL7Vwe/Gg0P+WhLKlBy4+Cp0SP5+f20wCc:cws2ANnKXOaeOgmhkUbCp0e5+fy
Static task
static1
Behavioral task
behavioral1
Sample
c8a7377c2b54ff59408f5307d84522e5f457f16a172cfcef7430f35a96ab15bd.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
c8a7377c2b54ff59408f5307d84522e5f457f16a172cfcef7430f35a96ab15bd
-
Size
3.8MB
-
MD5
64ad45da27634136c56751119efb70e7
-
SHA1
c5e5684d80dddf7c19b22880fbc5559124333640
-
SHA256
c8a7377c2b54ff59408f5307d84522e5f457f16a172cfcef7430f35a96ab15bd
-
SHA512
ad1efe41941981fbd539d6dd016faa62617fe428754b80410c1aa425a224f1947d76ac5910cf6019e9eb11122b5622d0bf097a5113390e1d454019b87dc840c5
-
SSDEEP
49152:RCwsbCANnKXferL7Vwe/Gg0P+WhLKlBy4+Cp0SP5+f20wCc:cws2ANnKXOaeOgmhkUbCp0e5+fy
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1