General
-
Target
ac37566c40ffe8d4e0cb7a27898639c18339db3b6eb90368eb4a37d6865c1336
-
Size
1.2MB
-
Sample
241216-w73traxmcz
-
MD5
040db055c36d8e0a9433d954a9912ca4
-
SHA1
b63d1249dc1ad9fe8f867d0df718715e622777a9
-
SHA256
ac37566c40ffe8d4e0cb7a27898639c18339db3b6eb90368eb4a37d6865c1336
-
SHA512
6f1d003407a514f6426f8f48e3d7c073cad57f20006ceb1e5223c9543a1c3de42158e460898ba325e8833df42476b4d239f85b053cf9aa1b053be5d444cfb116
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtik:WIwgMEuy+inDfp3/XoCw57XYBwKk
Behavioral task
behavioral1
Sample
ac37566c40ffe8d4e0cb7a27898639c18339db3b6eb90368eb4a37d6865c1336.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
ac37566c40ffe8d4e0cb7a27898639c18339db3b6eb90368eb4a37d6865c1336
-
Size
1.2MB
-
MD5
040db055c36d8e0a9433d954a9912ca4
-
SHA1
b63d1249dc1ad9fe8f867d0df718715e622777a9
-
SHA256
ac37566c40ffe8d4e0cb7a27898639c18339db3b6eb90368eb4a37d6865c1336
-
SHA512
6f1d003407a514f6426f8f48e3d7c073cad57f20006ceb1e5223c9543a1c3de42158e460898ba325e8833df42476b4d239f85b053cf9aa1b053be5d444cfb116
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtik:WIwgMEuy+inDfp3/XoCw57XYBwKk
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2