General
-
Target
82d0f1faefd2fe89b7f14fa73f9088f06f186b11362a36912f880977c9d5d05b
-
Size
2.6MB
-
Sample
241111-gfrj3stgjl
-
MD5
ba0dfc58b362c8c799ff39173b87b80e
-
SHA1
1944b825b30a0ff14869c7538c0a43a6dfc9f0f4
-
SHA256
82d0f1faefd2fe89b7f14fa73f9088f06f186b11362a36912f880977c9d5d05b
-
SHA512
b659afef153506dde1dcd7ff48a70cc7461ce2865c1a1bf576fb37790934a50862958f84e3e78c7b3bdbb69a58251437af53c9ac94c5367c627333fc51094323
-
SSDEEP
24576:pCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHI:pCwsbCANnKXferL7Vwe/Gg0P+WhPom
Static task
static1
Behavioral task
behavioral1
Sample
82d0f1faefd2fe89b7f14fa73f9088f06f186b11362a36912f880977c9d5d05b.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
82d0f1faefd2fe89b7f14fa73f9088f06f186b11362a36912f880977c9d5d05b
-
Size
2.6MB
-
MD5
ba0dfc58b362c8c799ff39173b87b80e
-
SHA1
1944b825b30a0ff14869c7538c0a43a6dfc9f0f4
-
SHA256
82d0f1faefd2fe89b7f14fa73f9088f06f186b11362a36912f880977c9d5d05b
-
SHA512
b659afef153506dde1dcd7ff48a70cc7461ce2865c1a1bf576fb37790934a50862958f84e3e78c7b3bdbb69a58251437af53c9ac94c5367c627333fc51094323
-
SSDEEP
24576:pCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHI:pCwsbCANnKXferL7Vwe/Gg0P+WhPom
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1