General
-
Target
f21ba792d20bc2199fda31690fe840e70f51864e650d813768711fc7b06fcc21
-
Size
1.2MB
-
Sample
241114-ytaxxssepa
-
MD5
3167010bcd72e916cb7203b3e58b1cb2
-
SHA1
50b69312e5535b33563e3f7d7d1c9bfaed51e498
-
SHA256
f21ba792d20bc2199fda31690fe840e70f51864e650d813768711fc7b06fcc21
-
SHA512
f5a0557bcef6ecfbbfb24736601be01e5d066962964850aa23e5a0d8dbda99f582ba40b2026910618d9ef66a59f78a508fb59b28803c8be80caf0840feeb45d4
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiZ:WIwgMEuy+inDfp3/XoCw57XYBwKZ
Behavioral task
behavioral1
Sample
f21ba792d20bc2199fda31690fe840e70f51864e650d813768711fc7b06fcc21.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
f21ba792d20bc2199fda31690fe840e70f51864e650d813768711fc7b06fcc21
-
Size
1.2MB
-
MD5
3167010bcd72e916cb7203b3e58b1cb2
-
SHA1
50b69312e5535b33563e3f7d7d1c9bfaed51e498
-
SHA256
f21ba792d20bc2199fda31690fe840e70f51864e650d813768711fc7b06fcc21
-
SHA512
f5a0557bcef6ecfbbfb24736601be01e5d066962964850aa23e5a0d8dbda99f582ba40b2026910618d9ef66a59f78a508fb59b28803c8be80caf0840feeb45d4
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiZ:WIwgMEuy+inDfp3/XoCw57XYBwKZ
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2