General
-
Target
c283da8e95238c63db7c1f0bb1babadaaf3c5e11a0e0154c85b637d75b0b208a
-
Size
3.5MB
-
Sample
241125-ggv9na1rcz
-
MD5
81104831920a8040c965067b4a69b4ec
-
SHA1
128babc812b9b8d5f1d05b8b6bca74cc4d6ff497
-
SHA256
c283da8e95238c63db7c1f0bb1babadaaf3c5e11a0e0154c85b637d75b0b208a
-
SHA512
d1fb4e2bb5593bab6ec40021dd15b99afff451084abca8073f901473af2b2f15e0a894537b57678109678c5a886ad08d567874937e93ca8732104ad45f43eb60
-
SSDEEP
98304:0ZJt4HINy2LkHBgowREJBpNnKqq/woaBwihe:6iINy2LkrFbGihe
Static task
static1
Behavioral task
behavioral1
Sample
c283da8e95238c63db7c1f0bb1babadaaf3c5e11a0e0154c85b637d75b0b208a.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
c283da8e95238c63db7c1f0bb1babadaaf3c5e11a0e0154c85b637d75b0b208a
-
Size
3.5MB
-
MD5
81104831920a8040c965067b4a69b4ec
-
SHA1
128babc812b9b8d5f1d05b8b6bca74cc4d6ff497
-
SHA256
c283da8e95238c63db7c1f0bb1babadaaf3c5e11a0e0154c85b637d75b0b208a
-
SHA512
d1fb4e2bb5593bab6ec40021dd15b99afff451084abca8073f901473af2b2f15e0a894537b57678109678c5a886ad08d567874937e93ca8732104ad45f43eb60
-
SSDEEP
98304:0ZJt4HINy2LkHBgowREJBpNnKqq/woaBwihe:6iINy2LkrFbGihe
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1