General
-
Target
f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02
-
Size
4.1MB
-
Sample
241026-g7wm4sscpn
-
MD5
628667cea08aed36ee5c282b81f30cc8
-
SHA1
5362fa8e9b654863251b7768389ca5f05a3e6ea0
-
SHA256
f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02
-
SHA512
21fd13e45caa65093dcc193fccf54a679146e3693102081b80ad2e4796487d1298c5b99dd830f4d3152b9acdbb21f7e171b785ee8208516cad2f77dbb12fc789
-
SSDEEP
98304:IFk+Zmo3roc///////J5pW0gf3bTh6a+JBAUZLfmF:4ZNpM3bN6PJVK
Static task
static1
Behavioral task
behavioral1
Sample
f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02
-
Size
4.1MB
-
MD5
628667cea08aed36ee5c282b81f30cc8
-
SHA1
5362fa8e9b654863251b7768389ca5f05a3e6ea0
-
SHA256
f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02
-
SHA512
21fd13e45caa65093dcc193fccf54a679146e3693102081b80ad2e4796487d1298c5b99dd830f4d3152b9acdbb21f7e171b785ee8208516cad2f77dbb12fc789
-
SSDEEP
98304:IFk+Zmo3roc///////J5pW0gf3bTh6a+JBAUZLfmF:4ZNpM3bN6PJVK
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1