General
-
Target
d4a126a8d0ecf6db5aff4d2ee4fa65bae21a7d85a8697e425644f74769a851a4
-
Size
5.0MB
-
Sample
241222-fdbv6strdn
-
MD5
c7adb0aee7e3651e7ffb04337f42be90
-
SHA1
6eae418e08d9429d9e19f28272f25e2f311b2704
-
SHA256
d4a126a8d0ecf6db5aff4d2ee4fa65bae21a7d85a8697e425644f74769a851a4
-
SHA512
724cadc39071567da7152cd9c295ad724255bc564567ca3475e31471d99163a1cc36c3975773e2048d1cac963ca471569cfce0ab128a70afcf31e1bf5c8364b9
-
SSDEEP
98304:xcy2LkcMNB6cDqnTgnRkidZ7C0eNGyJW3lE4RrtRmrpIZhGuul38YR7O8sOKduGs:6y2LkcMNRdnRkgCNGyJ/IJYR7vsOKwGV
Static task
static1
Behavioral task
behavioral1
Sample
d4a126a8d0ecf6db5aff4d2ee4fa65bae21a7d85a8697e425644f74769a851a4.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d4a126a8d0ecf6db5aff4d2ee4fa65bae21a7d85a8697e425644f74769a851a4.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
d4a126a8d0ecf6db5aff4d2ee4fa65bae21a7d85a8697e425644f74769a851a4
-
Size
5.0MB
-
MD5
c7adb0aee7e3651e7ffb04337f42be90
-
SHA1
6eae418e08d9429d9e19f28272f25e2f311b2704
-
SHA256
d4a126a8d0ecf6db5aff4d2ee4fa65bae21a7d85a8697e425644f74769a851a4
-
SHA512
724cadc39071567da7152cd9c295ad724255bc564567ca3475e31471d99163a1cc36c3975773e2048d1cac963ca471569cfce0ab128a70afcf31e1bf5c8364b9
-
SSDEEP
98304:xcy2LkcMNB6cDqnTgnRkidZ7C0eNGyJW3lE4RrtRmrpIZhGuul38YR7O8sOKduGs:6y2LkcMNRdnRkgCNGyJ/IJYR7vsOKwGV
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Discovery
Browser Information Discovery
1Query Registry
3Remote System Discovery
1Software Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1