General
-
Target
2025-03-03_a69273e15f761f1aba60604ae7823581_hijackloader_ryuk
-
Size
20.2MB
-
Sample
250303-l23axsvwcx
-
MD5
a69273e15f761f1aba60604ae7823581
-
SHA1
f7a5fbb131ac38592208f534bb45d5927ef33bd1
-
SHA256
361d4971fb5d11daf62336bbf8427a17c4e1b6c7b33db0c82037d34cc9ae07b8
-
SHA512
84b4b62eca8d781d29bf21f519356460346d75a6998130ef88d23e69de6dea1a6d92df9dd2b2625261520ad3c5f8479c0d4637ce29900548e6e6bea2c8f15ede
-
SSDEEP
196608:oatpgF2oM7Vk96Cy8xEqn0SweKG8PvMTnsOTLkE:9tpgF2oM7Vk96Cy8xEqn0MlAvYnsO3J
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-03_a69273e15f761f1aba60604ae7823581_hijackloader_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-03_a69273e15f761f1aba60604ae7823581_hijackloader_ryuk.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
https://baba-1336130708.cos.ap-tokyo.myqcloud.com/as.exe
Targets
-
-
Target
2025-03-03_a69273e15f761f1aba60604ae7823581_hijackloader_ryuk
-
Size
20.2MB
-
MD5
a69273e15f761f1aba60604ae7823581
-
SHA1
f7a5fbb131ac38592208f534bb45d5927ef33bd1
-
SHA256
361d4971fb5d11daf62336bbf8427a17c4e1b6c7b33db0c82037d34cc9ae07b8
-
SHA512
84b4b62eca8d781d29bf21f519356460346d75a6998130ef88d23e69de6dea1a6d92df9dd2b2625261520ad3c5f8479c0d4637ce29900548e6e6bea2c8f15ede
-
SSDEEP
196608:oatpgF2oM7Vk96Cy8xEqn0SweKG8PvMTnsOTLkE:9tpgF2oM7Vk96Cy8xEqn0MlAvYnsO3J
-
Fatalrat family
-
Gh0st RAT payload
-
Gh0strat family
-
UAC bypass
-
Fatal Rat payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2