General
-
Target
d4bfd0ba83a84dfb292062b2c4a51b6e08943ab5723e06ffbb87c1a0280dd630
-
Size
2.5MB
-
Sample
241203-tkknjsxqhk
-
MD5
0df90c05a5b986cabaea462af4d38bd8
-
SHA1
293baec15c0bf8cf405f3e2e091ae010567861f5
-
SHA256
d4bfd0ba83a84dfb292062b2c4a51b6e08943ab5723e06ffbb87c1a0280dd630
-
SHA512
6dd9edf127ed7b402bb0878d2789668a227c02fc69f0b87a63aa957992ff7c66e734633d76c1c7365e682c1fb6415223e31a9dbab61174188812c0c930597200
-
SSDEEP
24576:UCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nH8:UCwsbCANnKXferL7Vwe/Gg0P+Whse6k
Static task
static1
Behavioral task
behavioral1
Sample
d4bfd0ba83a84dfb292062b2c4a51b6e08943ab5723e06ffbb87c1a0280dd630.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
d4bfd0ba83a84dfb292062b2c4a51b6e08943ab5723e06ffbb87c1a0280dd630
-
Size
2.5MB
-
MD5
0df90c05a5b986cabaea462af4d38bd8
-
SHA1
293baec15c0bf8cf405f3e2e091ae010567861f5
-
SHA256
d4bfd0ba83a84dfb292062b2c4a51b6e08943ab5723e06ffbb87c1a0280dd630
-
SHA512
6dd9edf127ed7b402bb0878d2789668a227c02fc69f0b87a63aa957992ff7c66e734633d76c1c7365e682c1fb6415223e31a9dbab61174188812c0c930597200
-
SSDEEP
24576:UCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nH8:UCwsbCANnKXferL7Vwe/Gg0P+Whse6k
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1