Analisado por: Nathaniel Gregory Ragasa   

 

Win64:Evo-gen [Trj](AVAST)

 Plataforma:

Windows

 Classificao do risco total:
 Potencial de dano:
 Potencial de distribuição:
 infecção relatada:
 Exposição das informações:
Baixo
Medium
Alto
Crítico

  • Tipo de grayware:
    Hacking Tool

  • Destrutivo:
    Não

  • Criptografado:
     

  • In the Wild:
    Sim

  Visão geral

Canal de infecção: Aus dem Internet heruntergeladen, Fallen gelassen von anderer Malware

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  Detalhes técnicos

Tipo de compactação: 409,088 bytes
Tipo de arquivo: EXE
Residente na memória: Não

Übertragungsdetails

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Andere Details

Es macht Folgendes:

  • It is a tool to enumerate and abuse misconfigurations in Active Directory Certificate Services (AD CS).
  • It can find information about all registered CAs.
  • It can find all enabled certificate templates.
  • It can find vulnerable/abusable certificate templates using default low-privileged groups
  • It can find enabled certificate templates where ENROLLEE_SUPPLIES_SUBJECT is enabled
  • It can find enabled certificate templates capable of client authentication
  • It can find all enabled certificate templates, display all of their permissions.
  • It can find all enabled certificate templates and output to a json file.
  • It can Enumerate access control information for PKI objects
  • It can request a new certificate using the current user context
  • It can request a new certificate using the current machine context
  • It can request a new certificate using the current user context but for an alternate name (if supported)
  • It can request a new certificate on behalf of another user, using an enrollment agent certificate
  • It can download an already requested certificate
  • It can query LDAP in order to list templates which allow domain users to enroll.
  • It can discover certificates that allow Client Authentication
  • It can enroll certificate to a User
  • It can enroll Domain Users Rights
  • It can show Enterprise CA Information
  • It could request certificates for the machine account by executing this tool with the “/machine” argument from an elevated command prompt. This could allow authentication to be performed as the machine account.

  Solução

Mecanismo de varredura mínima: 9.800
SSAPI Pattern File: 2.567.00
SSAPI Pattern Release Date: 17 novembro 2022

Step 2

Für Windows ME und XP Benutzer: Stellen Sie vor einer Suche sicher, dass die Systemwiederherstellung deaktiviert ist, damit der gesamte Computer durchsucht werden kann.

Step 3

Durchsuchen Sie Ihren Computer mit Ihrem Trend Micro Produkt, und löschen Sie Dateien, die als HackTool.Win64.GhostCert.A entdeckt werden. Falls die entdeckten Dateien bereits von Ihrem Trend Micro Produkt gesäubert, gelöscht oder in Quarantäne verschoben wurden, sind keine weiteren Schritte erforderlich. Dateien in Quarantäne können einfach gelöscht werden. Auf dieser Knowledge-Base-Seite finden Sie weitere Informationen.


Participe da nossa pesquisa!