General
-
Target
76a236349c0820e4dfba81e3382e50833ee238452c0c271d6a0cf83b4fcca235
-
Size
1.4MB
-
Sample
241212-3h9z4a1lgs
-
MD5
42eb813b6d1d942487977b2d1c99849d
-
SHA1
ed176942204d852d66b1b0401431be6b6233325a
-
SHA256
76a236349c0820e4dfba81e3382e50833ee238452c0c271d6a0cf83b4fcca235
-
SHA512
13784b32ff6dd7b8a699251a30a9d75e0e967d447a01e1ef357596652ff26a8c5a5a812db2d8d08c581f9d9f1f071ed28030546e7b2a57095d9e00927bfbd0f9
-
SSDEEP
24576:MXU1T7iVITXAY9Pl4+va/61tvjnqZ3D6iyzwQngZqIVC9nSJhTNJDINp4X17uCD/:zTxDva/6nj3LbnqVVSSvINp4ks
Static task
static1
Behavioral task
behavioral1
Sample
76a236349c0820e4dfba81e3382e50833ee238452c0c271d6a0cf83b4fcca235.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
76a236349c0820e4dfba81e3382e50833ee238452c0c271d6a0cf83b4fcca235.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
76a236349c0820e4dfba81e3382e50833ee238452c0c271d6a0cf83b4fcca235
-
Size
1.4MB
-
MD5
42eb813b6d1d942487977b2d1c99849d
-
SHA1
ed176942204d852d66b1b0401431be6b6233325a
-
SHA256
76a236349c0820e4dfba81e3382e50833ee238452c0c271d6a0cf83b4fcca235
-
SHA512
13784b32ff6dd7b8a699251a30a9d75e0e967d447a01e1ef357596652ff26a8c5a5a812db2d8d08c581f9d9f1f071ed28030546e7b2a57095d9e00927bfbd0f9
-
SSDEEP
24576:MXU1T7iVITXAY9Pl4+va/61tvjnqZ3D6iyzwQngZqIVC9nSJhTNJDINp4X17uCD/:zTxDva/6nj3LbnqVVSSvINp4ks
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Deletes itself
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1