General
-
Target
9d8d407a7d8f82c1d9789141819a5fca30fdf3e983e1d3c71a83c4ce537f0563
-
Size
1.2MB
-
Sample
241106-k3kxlaxhmr
-
MD5
a7341dcb9ff0c7d8413396f53489476d
-
SHA1
7561a0f1cf17c8325bda850b5d597555e190d9a2
-
SHA256
9d8d407a7d8f82c1d9789141819a5fca30fdf3e983e1d3c71a83c4ce537f0563
-
SHA512
19daa688f73ee5999559ccd978beed0ff96d136674b2ba8219bae23bc5d06e744a88a0fe3dca2d16d8a7f6bd1639b9b6fcf59ed09f4ecd090e7751901c810b81
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiR:WIwgMEuy+inDfp3/XoCw57XYBwKR
Behavioral task
behavioral1
Sample
9d8d407a7d8f82c1d9789141819a5fca30fdf3e983e1d3c71a83c4ce537f0563.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
9d8d407a7d8f82c1d9789141819a5fca30fdf3e983e1d3c71a83c4ce537f0563
-
Size
1.2MB
-
MD5
a7341dcb9ff0c7d8413396f53489476d
-
SHA1
7561a0f1cf17c8325bda850b5d597555e190d9a2
-
SHA256
9d8d407a7d8f82c1d9789141819a5fca30fdf3e983e1d3c71a83c4ce537f0563
-
SHA512
19daa688f73ee5999559ccd978beed0ff96d136674b2ba8219bae23bc5d06e744a88a0fe3dca2d16d8a7f6bd1639b9b6fcf59ed09f4ecd090e7751901c810b81
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiR:WIwgMEuy+inDfp3/XoCw57XYBwKR
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2