General
-
Target
22c8fc9c7ab6759e665a4e9e8bdd2904538ab352038537085f643295b6f33724
-
Size
318KB
-
Sample
250328-sfdh1axwg1
-
MD5
78f9918d06e51b5b4e86e241c95bdbc6
-
SHA1
fd2331b18c165e2771ebd20d83fd671d9a0a6f7d
-
SHA256
22c8fc9c7ab6759e665a4e9e8bdd2904538ab352038537085f643295b6f33724
-
SHA512
cd7730cc3de8417303f9b9ff675281f17ab3e36b76a6c5d81f70e822f05c74d15727df96c6d7af7609b9fa9895b5788cebc6df64abaa86b6ffb1cb2801cbaa1a
-
SSDEEP
6144:ORoSgWbzYds0SfxsTxt3YeWH8k+p+Nj8DmV9Z3+jH:RSfbzc8GrYdcb88Dw+z
Behavioral task
behavioral1
Sample
22c8fc9c7ab6759e665a4e9e8bdd2904538ab352038537085f643295b6f33724.exe
Resource
win7-20241023-en
Malware Config
Extracted
gh0strat
host123.zz.am:6658
http://107.163.43.235:12388/
http://107.163.43.236:10289/support.php
-
user_agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C))
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Targets
-
-
Target
22c8fc9c7ab6759e665a4e9e8bdd2904538ab352038537085f643295b6f33724
-
Size
318KB
-
MD5
78f9918d06e51b5b4e86e241c95bdbc6
-
SHA1
fd2331b18c165e2771ebd20d83fd671d9a0a6f7d
-
SHA256
22c8fc9c7ab6759e665a4e9e8bdd2904538ab352038537085f643295b6f33724
-
SHA512
cd7730cc3de8417303f9b9ff675281f17ab3e36b76a6c5d81f70e822f05c74d15727df96c6d7af7609b9fa9895b5788cebc6df64abaa86b6ffb1cb2801cbaa1a
-
SSDEEP
6144:ORoSgWbzYds0SfxsTxt3YeWH8k+p+Nj8DmV9Z3+jH:RSfbzc8GrYdcb88Dw+z
-
Gh0strat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1