General
-
Target
0f03b3472498cdd326a423f43d97cb922e1a0aac5605f0042f1fb8d224da081f
-
Size
1.2MB
-
Sample
241111-srynba1djg
-
MD5
ef27aabf2a003334cc896825467a0b3d
-
SHA1
97012b6c773a83634ab2ed7cceee515c331a140c
-
SHA256
0f03b3472498cdd326a423f43d97cb922e1a0aac5605f0042f1fb8d224da081f
-
SHA512
e0f5f8922ce858757dc2e940119685964fa2a815913c49c0df7d0bc3809befb2bd2ae20bed06df37642533549ef184ac58c50fdca76a3ce8d98bbbd3a3470f9c
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJti4:WIwgMEuy+inDfp3/XoCw57XYBwK4
Behavioral task
behavioral1
Sample
0f03b3472498cdd326a423f43d97cb922e1a0aac5605f0042f1fb8d224da081f.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
0f03b3472498cdd326a423f43d97cb922e1a0aac5605f0042f1fb8d224da081f
-
Size
1.2MB
-
MD5
ef27aabf2a003334cc896825467a0b3d
-
SHA1
97012b6c773a83634ab2ed7cceee515c331a140c
-
SHA256
0f03b3472498cdd326a423f43d97cb922e1a0aac5605f0042f1fb8d224da081f
-
SHA512
e0f5f8922ce858757dc2e940119685964fa2a815913c49c0df7d0bc3809befb2bd2ae20bed06df37642533549ef184ac58c50fdca76a3ce8d98bbbd3a3470f9c
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJti4:WIwgMEuy+inDfp3/XoCw57XYBwK4
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2