General
-
Target
5f523ca858a54f437a676f1b03682fb73fb2c02c388e38214c3a306fb11bf395.msi.v
-
Size
31.4MB
-
Sample
241027-pjmdjaxdmf
-
MD5
44e80380964f2ccbc6bc7b14ad4ffd3f
-
SHA1
c1b9a5cf8b8b63860fab7b3e8094fb0f58892596
-
SHA256
5f523ca858a54f437a676f1b03682fb73fb2c02c388e38214c3a306fb11bf395
-
SHA512
93a9935aa0b14b99b8d74ecc9870a782907afd540a21759f56cc837fab72b33ce5386b7c6623987596fad15594848e47da36efed60d1553a566e2bc54c90647d
-
SSDEEP
786432:FPmtdVFmEvj9/DRTZVb2kZDJkj4BZELqx4LIsUtC1dQ+8eQfH2oPFQx:APVAW9Ff2kZaUBKLquL1UtCY+8x22FC
Static task
static1
Behavioral task
behavioral1
Sample
5f523ca858a54f437a676f1b03682fb73fb2c02c388e38214c3a306fb11bf395.msi
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
5f523ca858a54f437a676f1b03682fb73fb2c02c388e38214c3a306fb11bf395.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
5f523ca858a54f437a676f1b03682fb73fb2c02c388e38214c3a306fb11bf395.msi.v
-
Size
31.4MB
-
MD5
44e80380964f2ccbc6bc7b14ad4ffd3f
-
SHA1
c1b9a5cf8b8b63860fab7b3e8094fb0f58892596
-
SHA256
5f523ca858a54f437a676f1b03682fb73fb2c02c388e38214c3a306fb11bf395
-
SHA512
93a9935aa0b14b99b8d74ecc9870a782907afd540a21759f56cc837fab72b33ce5386b7c6623987596fad15594848e47da36efed60d1553a566e2bc54c90647d
-
SSDEEP
786432:FPmtdVFmEvj9/DRTZVb2kZDJkj4BZELqx4LIsUtC1dQ+8eQfH2oPFQx:APVAW9Ff2kZaUBKLquL1UtCY+8x22FC
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies Windows Firewall
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Installer Packages
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Installer Packages
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1System Binary Proxy Execution
1Msiexec
1