General
-
Target
106a5b1f45aa3c0858e3b10176e4713f4c50f2f84c9dd7a001005212e474e1fe
-
Size
1.2MB
-
Sample
241104-geyxrsvjat
-
MD5
0e1f9f70dd67ccb54d99ee6cd7b63b8a
-
SHA1
09cfe5054415f8bfb7b48ae381625aae6408857d
-
SHA256
106a5b1f45aa3c0858e3b10176e4713f4c50f2f84c9dd7a001005212e474e1fe
-
SHA512
36b9c3c0d3686de9a8c5488ab1170223c71281508d4142340541261870fc216ef695d0ca1b29e058e74aa66ab26b172245cec2ef91545c986a35aa4c8ef0c3b7
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiq:WIwgMEuy+inDfp3/XoCw57XYBwKq
Behavioral task
behavioral1
Sample
106a5b1f45aa3c0858e3b10176e4713f4c50f2f84c9dd7a001005212e474e1fe.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
106a5b1f45aa3c0858e3b10176e4713f4c50f2f84c9dd7a001005212e474e1fe
-
Size
1.2MB
-
MD5
0e1f9f70dd67ccb54d99ee6cd7b63b8a
-
SHA1
09cfe5054415f8bfb7b48ae381625aae6408857d
-
SHA256
106a5b1f45aa3c0858e3b10176e4713f4c50f2f84c9dd7a001005212e474e1fe
-
SHA512
36b9c3c0d3686de9a8c5488ab1170223c71281508d4142340541261870fc216ef695d0ca1b29e058e74aa66ab26b172245cec2ef91545c986a35aa4c8ef0c3b7
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiq:WIwgMEuy+inDfp3/XoCw57XYBwKq
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2