General
-
Target
210f60a89e7a05a1f6ab21f615b16416c7829032b8a4fd8bc6ca9918efe9716e
-
Size
1.2MB
-
Sample
241217-mxl9ksykgq
-
MD5
c097576fca16118496070ce5c7e3236b
-
SHA1
a69afaf46f732b956024f848a6d87b616889a3bc
-
SHA256
210f60a89e7a05a1f6ab21f615b16416c7829032b8a4fd8bc6ca9918efe9716e
-
SHA512
5cc738763b8c28ebc4d3cf7a32a9236c886639690b1c4cbb6766f1d4f741159377db7835fa4d977a8499c824d32f1cd853f0c25e7a2a23c824f23074feb33791
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJti+:WIwgMEuy+inDfp3/XoCw57XYBwK+
Behavioral task
behavioral1
Sample
210f60a89e7a05a1f6ab21f615b16416c7829032b8a4fd8bc6ca9918efe9716e.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
210f60a89e7a05a1f6ab21f615b16416c7829032b8a4fd8bc6ca9918efe9716e
-
Size
1.2MB
-
MD5
c097576fca16118496070ce5c7e3236b
-
SHA1
a69afaf46f732b956024f848a6d87b616889a3bc
-
SHA256
210f60a89e7a05a1f6ab21f615b16416c7829032b8a4fd8bc6ca9918efe9716e
-
SHA512
5cc738763b8c28ebc4d3cf7a32a9236c886639690b1c4cbb6766f1d4f741159377db7835fa4d977a8499c824d32f1cd853f0c25e7a2a23c824f23074feb33791
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJti+:WIwgMEuy+inDfp3/XoCw57XYBwK+
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2