General
-
Target
d25caac74114a3832a197d53e8dd4276b4ee51c585ed728c2095fa5c6599145a
-
Size
2.6MB
-
Sample
241101-ht164szlhp
-
MD5
04342999b8d65109568ed6a726ec6303
-
SHA1
d3a9fd65035e93467f0a0e27cb9ff82ed4fc6173
-
SHA256
d25caac74114a3832a197d53e8dd4276b4ee51c585ed728c2095fa5c6599145a
-
SHA512
3aa8a97074037cdb26a205f03f8b40ccd9cf6781dd896c9688af058569425f46899f92342ce5634d87fd717d9e5131a764784ff54ce9c64c5309fd645ceefd4c
-
SSDEEP
49152:KjwsbCANnKXferL7Vwe/Gg0P+WhdDmn2+:Qws2ANnKXOaeOgmhdDmn2+
Static task
static1
Behavioral task
behavioral1
Sample
d25caac74114a3832a197d53e8dd4276b4ee51c585ed728c2095fa5c6599145a.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
d25caac74114a3832a197d53e8dd4276b4ee51c585ed728c2095fa5c6599145a
-
Size
2.6MB
-
MD5
04342999b8d65109568ed6a726ec6303
-
SHA1
d3a9fd65035e93467f0a0e27cb9ff82ed4fc6173
-
SHA256
d25caac74114a3832a197d53e8dd4276b4ee51c585ed728c2095fa5c6599145a
-
SHA512
3aa8a97074037cdb26a205f03f8b40ccd9cf6781dd896c9688af058569425f46899f92342ce5634d87fd717d9e5131a764784ff54ce9c64c5309fd645ceefd4c
-
SSDEEP
49152:KjwsbCANnKXferL7Vwe/Gg0P+WhdDmn2+:Qws2ANnKXOaeOgmhdDmn2+
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1