General
-
Target
628e25fd13a13280c833eb2757eab2552a2bacf154e595f4f0281f125065b673
-
Size
3.7MB
-
Sample
241218-rfn43a1qcs
-
MD5
778cf2490e69017ac2ac4ee0d48522af
-
SHA1
49650c06d91269022edfa0b29441c534776378c2
-
SHA256
628e25fd13a13280c833eb2757eab2552a2bacf154e595f4f0281f125065b673
-
SHA512
eb19bd4251dde104bb5fb2737985515e7eb31d6385e4be4957a09946a9d299de832670bcc8d43ff2fa2beb159eb72d9aed5da2c64298d2ed9e6b9ba5ff7ee1db
-
SSDEEP
49152:hCwsbCANnKXferL7Vwe/Gg0P+WhmAHPkVOBTK:Mws2ANnKXOaeOgmhmNO0
Static task
static1
Behavioral task
behavioral1
Sample
628e25fd13a13280c833eb2757eab2552a2bacf154e595f4f0281f125065b673.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
628e25fd13a13280c833eb2757eab2552a2bacf154e595f4f0281f125065b673
-
Size
3.7MB
-
MD5
778cf2490e69017ac2ac4ee0d48522af
-
SHA1
49650c06d91269022edfa0b29441c534776378c2
-
SHA256
628e25fd13a13280c833eb2757eab2552a2bacf154e595f4f0281f125065b673
-
SHA512
eb19bd4251dde104bb5fb2737985515e7eb31d6385e4be4957a09946a9d299de832670bcc8d43ff2fa2beb159eb72d9aed5da2c64298d2ed9e6b9ba5ff7ee1db
-
SSDEEP
49152:hCwsbCANnKXferL7Vwe/Gg0P+WhmAHPkVOBTK:Mws2ANnKXOaeOgmhmNO0
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1