General
-
Target
d6e2a33e5247c3ad636653e4c5a29d3d9f206c8294b9c50b849385b0fe01415a
-
Size
4.5MB
-
Sample
241216-w6ds8sxrhp
-
MD5
b84ec058fc86a6e3c1c56844c7989989
-
SHA1
e66bdfcf515b537679a55872b4e7ad79a3e87496
-
SHA256
d6e2a33e5247c3ad636653e4c5a29d3d9f206c8294b9c50b849385b0fe01415a
-
SHA512
56d21d2b3d4ecfc2c78a256c3879f8354645d32d49d39e3a2658c89ada74eaf087c9b42d1d0e2b88c9f363a6b33b65c1374d253214af3cbfc2859c064ced5ac9
-
SSDEEP
98304:hws2ANnKXOaeOgmhwWw0H7+ZUX8ZqvOd/cV/20V5hkgk/J:zKXbeO7DH7d2YVm
Static task
static1
Behavioral task
behavioral1
Sample
d6e2a33e5247c3ad636653e4c5a29d3d9f206c8294b9c50b849385b0fe01415a.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
d6e2a33e5247c3ad636653e4c5a29d3d9f206c8294b9c50b849385b0fe01415a
-
Size
4.5MB
-
MD5
b84ec058fc86a6e3c1c56844c7989989
-
SHA1
e66bdfcf515b537679a55872b4e7ad79a3e87496
-
SHA256
d6e2a33e5247c3ad636653e4c5a29d3d9f206c8294b9c50b849385b0fe01415a
-
SHA512
56d21d2b3d4ecfc2c78a256c3879f8354645d32d49d39e3a2658c89ada74eaf087c9b42d1d0e2b88c9f363a6b33b65c1374d253214af3cbfc2859c064ced5ac9
-
SSDEEP
98304:hws2ANnKXOaeOgmhwWw0H7+ZUX8ZqvOd/cV/20V5hkgk/J:zKXbeO7DH7d2YVm
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1