General
-
Target
6d68fc06d04dc462cd67325ce3231f5556188ba485f74832ff78e10c47833a36
-
Size
1.2MB
-
Sample
241016-x5ql3sxgja
-
MD5
5fc41a6efba84e693e0856493ff6ace2
-
SHA1
9daafa17413782f7792806f1e53924e6665b91e3
-
SHA256
6d68fc06d04dc462cd67325ce3231f5556188ba485f74832ff78e10c47833a36
-
SHA512
fec90a6a581431248a614bebac13948facf4b7471abb7472bf6ee94e7011fce5694a7c11f6f0b38d5536129258975dac6cb0d298308fc1971d6c56bd5ce4e115
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtih:WIwgMEuy+inDfp3/XoCw57XYBwKh
Behavioral task
behavioral1
Sample
6d68fc06d04dc462cd67325ce3231f5556188ba485f74832ff78e10c47833a36.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
6d68fc06d04dc462cd67325ce3231f5556188ba485f74832ff78e10c47833a36
-
Size
1.2MB
-
MD5
5fc41a6efba84e693e0856493ff6ace2
-
SHA1
9daafa17413782f7792806f1e53924e6665b91e3
-
SHA256
6d68fc06d04dc462cd67325ce3231f5556188ba485f74832ff78e10c47833a36
-
SHA512
fec90a6a581431248a614bebac13948facf4b7471abb7472bf6ee94e7011fce5694a7c11f6f0b38d5536129258975dac6cb0d298308fc1971d6c56bd5ce4e115
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtih:WIwgMEuy+inDfp3/XoCw57XYBwKh
-
Gh0st RAT payload
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2