General
-
Target
0686b37e10ed42c2e324095b68ec3e3f25e5756ce14c4aed56ce4803a3fb4782
-
Size
2.4MB
-
Sample
241225-km4d1a1phk
-
MD5
f0a1e2cd263c93ea7ad7d0906c67d789
-
SHA1
e9d4fa908e8e8e070b16798a389b0eccc84787bd
-
SHA256
0686b37e10ed42c2e324095b68ec3e3f25e5756ce14c4aed56ce4803a3fb4782
-
SHA512
72c08e9ab5baab50d7c50188f8f739f07d1741441a2b7c41686452a03c73086aba61fd6cbad2c3055402d1e9ba34ffda42908e2c1d843fe9c96961929bfce358
-
SSDEEP
24576:KCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHD:KCwsbCANnKXferL7Vwe/Gg0P+Whpt/g
Static task
static1
Behavioral task
behavioral1
Sample
0686b37e10ed42c2e324095b68ec3e3f25e5756ce14c4aed56ce4803a3fb4782.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
0686b37e10ed42c2e324095b68ec3e3f25e5756ce14c4aed56ce4803a3fb4782
-
Size
2.4MB
-
MD5
f0a1e2cd263c93ea7ad7d0906c67d789
-
SHA1
e9d4fa908e8e8e070b16798a389b0eccc84787bd
-
SHA256
0686b37e10ed42c2e324095b68ec3e3f25e5756ce14c4aed56ce4803a3fb4782
-
SHA512
72c08e9ab5baab50d7c50188f8f739f07d1741441a2b7c41686452a03c73086aba61fd6cbad2c3055402d1e9ba34ffda42908e2c1d843fe9c96961929bfce358
-
SSDEEP
24576:KCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHD:KCwsbCANnKXferL7Vwe/Gg0P+Whpt/g
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1