General
-
Target
7249c26a6b3771492f8a1404fe54468e635a361bede8833d9815bfd099f31843
-
Size
1.2MB
-
Sample
241222-fg8z3stras
-
MD5
aa4700449810cdacd82ea5c9c2e73de9
-
SHA1
492b2bb7408c406b2f0475de2fe85a107e42ca05
-
SHA256
7249c26a6b3771492f8a1404fe54468e635a361bede8833d9815bfd099f31843
-
SHA512
7670414ce03de37e318c4db695f5a8de2b80b581b5bd73595d37d1c6c36e17864ca40ee4f55955fd8b6f7636f608289425439ddb21d375330e7289dc1e6a405f
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiH:WIwgMEuy+inDfp3/XoCw57XYBwKH
Behavioral task
behavioral1
Sample
7249c26a6b3771492f8a1404fe54468e635a361bede8833d9815bfd099f31843.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
7249c26a6b3771492f8a1404fe54468e635a361bede8833d9815bfd099f31843
-
Size
1.2MB
-
MD5
aa4700449810cdacd82ea5c9c2e73de9
-
SHA1
492b2bb7408c406b2f0475de2fe85a107e42ca05
-
SHA256
7249c26a6b3771492f8a1404fe54468e635a361bede8833d9815bfd099f31843
-
SHA512
7670414ce03de37e318c4db695f5a8de2b80b581b5bd73595d37d1c6c36e17864ca40ee4f55955fd8b6f7636f608289425439ddb21d375330e7289dc1e6a405f
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiH:WIwgMEuy+inDfp3/XoCw57XYBwKH
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2