General
-
Target
yasuo_siwndseh-X64.msi.vir
-
Size
24.0MB
-
Sample
241118-lsrg3atmct
-
MD5
b54bfb18c65fdeb70b2070b7513ae98c
-
SHA1
6512195f6c46d4444ea03bc1894923d2e8b2141f
-
SHA256
53dfd010c500008fc34b434c440c7561b8cca5054694656415904d57be645711
-
SHA512
6a9e1d253090ad7e9c6ef1ec8b0da185fccc99be7df6fe78a100b4d19898c248af062a1455949e65d0669f72ddc6b4dce7201f42af684e1e69f365f1fe079944
-
SSDEEP
393216:MOPUaSdS0X7SZnLu/LzW8NHqHl23q1695eQW8/nFQwyNFjFGbJT08nUKl8GrTdR:xPJJx1UNKHMa169YdCnFKTjFGbJuKl8L
Static task
static1
Behavioral task
behavioral1
Sample
yasuo_siwndseh-X64.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
yasuo_siwndseh-X64.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
yasuo_siwndseh-X64.msi.vir
-
Size
24.0MB
-
MD5
b54bfb18c65fdeb70b2070b7513ae98c
-
SHA1
6512195f6c46d4444ea03bc1894923d2e8b2141f
-
SHA256
53dfd010c500008fc34b434c440c7561b8cca5054694656415904d57be645711
-
SHA512
6a9e1d253090ad7e9c6ef1ec8b0da185fccc99be7df6fe78a100b4d19898c248af062a1455949e65d0669f72ddc6b4dce7201f42af684e1e69f365f1fe079944
-
SSDEEP
393216:MOPUaSdS0X7SZnLu/LzW8NHqHl23q1695eQW8/nFQwyNFjFGbJT08nUKl8GrTdR:xPJJx1UNKHMa169YdCnFKTjFGbJuKl8L
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Installer Packages
1Pre-OS Boot
1Bootkit
1Defense Evasion
Pre-OS Boot
1Bootkit
1System Binary Proxy Execution
1Msiexec
1