General
-
Target
d1a4309a0ca0c21b3c711a1c43ec1f1eb2edc19337496402726cbd688b12ee3c
-
Size
1.4MB
-
Sample
241116-j5ctbssgnd
-
MD5
cc8b4dcd81fb396033430c13d4d15c5a
-
SHA1
878df9a61fc0898fb20bdbac49f2f757da69e50d
-
SHA256
d1a4309a0ca0c21b3c711a1c43ec1f1eb2edc19337496402726cbd688b12ee3c
-
SHA512
6a863c8419c639eb52a63e8f63e51c03536f40330c62818db0b0b62823f470e4a77a340c79864946879381ab4b4acfb023978e69f54994f7fce2cfc39083a975
-
SSDEEP
24576:F39WkOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:59qHPkVOBTK
Static task
static1
Behavioral task
behavioral1
Sample
d1a4309a0ca0c21b3c711a1c43ec1f1eb2edc19337496402726cbd688b12ee3c.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
d1a4309a0ca0c21b3c711a1c43ec1f1eb2edc19337496402726cbd688b12ee3c
-
Size
1.4MB
-
MD5
cc8b4dcd81fb396033430c13d4d15c5a
-
SHA1
878df9a61fc0898fb20bdbac49f2f757da69e50d
-
SHA256
d1a4309a0ca0c21b3c711a1c43ec1f1eb2edc19337496402726cbd688b12ee3c
-
SHA512
6a863c8419c639eb52a63e8f63e51c03536f40330c62818db0b0b62823f470e4a77a340c79864946879381ab4b4acfb023978e69f54994f7fce2cfc39083a975
-
SSDEEP
24576:F39WkOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:59qHPkVOBTK
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1