General
-
Target
010367d9fc0fdd9de68af62a4e56a5e311a7c8c9d76b706cae59ea8a38f7d9f2.msi.vir
-
Size
96.3MB
-
Sample
241216-fbrtlsvkgt
-
MD5
cc9cd8ad9a22acb8305eb14d0a8bfcd1
-
SHA1
a097850d43b2a7c094069ac758c8cdc6565af8e5
-
SHA256
010367d9fc0fdd9de68af62a4e56a5e311a7c8c9d76b706cae59ea8a38f7d9f2
-
SHA512
9a529b79c727474f45f55093972885503103a8ca7437600562adf4c5f0112e7113ff892726d1e67edce4655a910d5e49337543dac4db7d381aa725a544aa7f8d
-
SSDEEP
3145728:N+LEmAi0QDF3gzILlHgytL79ORBow2zanEL+X:NonQchHNP9EgBL
Static task
static1
Behavioral task
behavioral1
Sample
010367d9fc0fdd9de68af62a4e56a5e311a7c8c9d76b706cae59ea8a38f7d9f2.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
010367d9fc0fdd9de68af62a4e56a5e311a7c8c9d76b706cae59ea8a38f7d9f2.msi
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
010367d9fc0fdd9de68af62a4e56a5e311a7c8c9d76b706cae59ea8a38f7d9f2.msi.vir
-
Size
96.3MB
-
MD5
cc9cd8ad9a22acb8305eb14d0a8bfcd1
-
SHA1
a097850d43b2a7c094069ac758c8cdc6565af8e5
-
SHA256
010367d9fc0fdd9de68af62a4e56a5e311a7c8c9d76b706cae59ea8a38f7d9f2
-
SHA512
9a529b79c727474f45f55093972885503103a8ca7437600562adf4c5f0112e7113ff892726d1e67edce4655a910d5e49337543dac4db7d381aa725a544aa7f8d
-
SSDEEP
3145728:N+LEmAi0QDF3gzILlHgytL79ORBow2zanEL+X:NonQchHNP9EgBL
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1System Binary Proxy Execution
1Msiexec
1