General
-
Target
24de619d714456dbba177b8461b82e889b63f96f154f722f01029d22b59399c7
-
Size
2.0MB
-
Sample
241114-e61jkavckh
-
MD5
7c42c0289a8ef2395efc1e7925b2d16e
-
SHA1
5b75f9495a791d982e269f3fb4dcac2b95f5138c
-
SHA256
24de619d714456dbba177b8461b82e889b63f96f154f722f01029d22b59399c7
-
SHA512
01e5a6f9a5145e01603c84f772e038b2ee40e45fb4d9b307269b199411fa68127e2443ede7ea30f0c630d2c84090de2c38b75ff8e139a7886e341e82b36750bc
-
SSDEEP
24576:hCIRyPP2GXKWAftKuRz2tgJZA5r5NCLytLSBy/r4/c4W6dVypXkPckF+XM/HU93G:CPBKWO02gSAIW4k4W6fskkkF+SHU932B
Static task
static1
Behavioral task
behavioral1
Sample
24de619d714456dbba177b8461b82e889b63f96f154f722f01029d22b59399c7.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
24de619d714456dbba177b8461b82e889b63f96f154f722f01029d22b59399c7
-
Size
2.0MB
-
MD5
7c42c0289a8ef2395efc1e7925b2d16e
-
SHA1
5b75f9495a791d982e269f3fb4dcac2b95f5138c
-
SHA256
24de619d714456dbba177b8461b82e889b63f96f154f722f01029d22b59399c7
-
SHA512
01e5a6f9a5145e01603c84f772e038b2ee40e45fb4d9b307269b199411fa68127e2443ede7ea30f0c630d2c84090de2c38b75ff8e139a7886e341e82b36750bc
-
SSDEEP
24576:hCIRyPP2GXKWAftKuRz2tgJZA5r5NCLytLSBy/r4/c4W6dVypXkPckF+XM/HU93G:CPBKWO02gSAIW4k4W6fskkkF+SHU932B
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1