General
-
Target
9c008d260310b2a9367709126821b1ba2ed7818bdd737bf80473736516f33392
-
Size
1.2MB
-
Sample
241107-w3wvmsxarm
-
MD5
507eeda3cf1459c8563ae99f7876fba7
-
SHA1
fb29d3e0806069ff464e8e57be7058ece3cacfd0
-
SHA256
9c008d260310b2a9367709126821b1ba2ed7818bdd737bf80473736516f33392
-
SHA512
5375b40106e3e5af1d3056a0c1e2096231f373a2e8cd7175046b21a8f62a4db32404b5629b732893d27759dc65fa1195c015af35ae587a6e82d110039411d64f
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiY:WIwgMEuy+inDfp3/XoCw57XYBwKY
Behavioral task
behavioral1
Sample
9c008d260310b2a9367709126821b1ba2ed7818bdd737bf80473736516f33392.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
9c008d260310b2a9367709126821b1ba2ed7818bdd737bf80473736516f33392
-
Size
1.2MB
-
MD5
507eeda3cf1459c8563ae99f7876fba7
-
SHA1
fb29d3e0806069ff464e8e57be7058ece3cacfd0
-
SHA256
9c008d260310b2a9367709126821b1ba2ed7818bdd737bf80473736516f33392
-
SHA512
5375b40106e3e5af1d3056a0c1e2096231f373a2e8cd7175046b21a8f62a4db32404b5629b732893d27759dc65fa1195c015af35ae587a6e82d110039411d64f
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiY:WIwgMEuy+inDfp3/XoCw57XYBwKY
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2