General
-
Target
363b271ba14831480deb1b65d2c5a2312a92d215aefc5eb8f585e6706d22c7e6
-
Size
1.4MB
-
Sample
241108-wk829ayran
-
MD5
b5293a72cc8aaee316350a68f5e5360d
-
SHA1
91074e714091c8d56792fd339e96ffdd2075aa03
-
SHA256
363b271ba14831480deb1b65d2c5a2312a92d215aefc5eb8f585e6706d22c7e6
-
SHA512
c5d7526426ed1fc4110a7447cfce380aff9daf7b6c57efe3a31332b3ab9312fec6ab910f6f56f0a96e39af65cad5d257facc84416c6a9ee45adba90f0d2b0c02
-
SSDEEP
24576:F39WkOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:59qHPkVOBTK
Static task
static1
Behavioral task
behavioral1
Sample
363b271ba14831480deb1b65d2c5a2312a92d215aefc5eb8f585e6706d22c7e6.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
363b271ba14831480deb1b65d2c5a2312a92d215aefc5eb8f585e6706d22c7e6
-
Size
1.4MB
-
MD5
b5293a72cc8aaee316350a68f5e5360d
-
SHA1
91074e714091c8d56792fd339e96ffdd2075aa03
-
SHA256
363b271ba14831480deb1b65d2c5a2312a92d215aefc5eb8f585e6706d22c7e6
-
SHA512
c5d7526426ed1fc4110a7447cfce380aff9daf7b6c57efe3a31332b3ab9312fec6ab910f6f56f0a96e39af65cad5d257facc84416c6a9ee45adba90f0d2b0c02
-
SSDEEP
24576:F39WkOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:59qHPkVOBTK
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1