Analysis
-
max time kernel
252s -
max time network
307s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 13:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
28126b43d05a3b023c6495790eb51fd7f62955a9aa87b47201f0e7b3ccac9a9f.exe
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
28126b43d05a3b023c6495790eb51fd7f62955a9aa87b47201f0e7b3ccac9a9f.exe
-
Size
1.4MB
-
MD5
c062661f3c6ab0105d084ed02f5878c9
-
SHA1
fd17b4c1582e5c70884ef000536959471fe6b6c8
-
SHA256
28126b43d05a3b023c6495790eb51fd7f62955a9aa87b47201f0e7b3ccac9a9f
-
SHA512
a4202b46e27957e0ffb147384cf74f35a974b59a5276c3e1ab9e397d22ec13fc1c56ac8a792554e4745c1a89ca8071bc872a7491e1803a57cd8d8ef17a0026eb
-
SSDEEP
24576:F39WaOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:598HPkVOBTK
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1060-0-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1060-0-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1060 28126b43d05a3b023c6495790eb51fd7f62955a9aa87b47201f0e7b3ccac9a9f.exe Token: SeIncBasePriorityPrivilege 1060 28126b43d05a3b023c6495790eb51fd7f62955a9aa87b47201f0e7b3ccac9a9f.exe Token: 33 1060 28126b43d05a3b023c6495790eb51fd7f62955a9aa87b47201f0e7b3ccac9a9f.exe Token: SeIncBasePriorityPrivilege 1060 28126b43d05a3b023c6495790eb51fd7f62955a9aa87b47201f0e7b3ccac9a9f.exe