General
-
Target
d7e1a0dfadf975340155e8955e913cb07f6e830f4d2b37b47a0ce8e61eae4fa6
-
Size
1.2MB
-
Sample
241225-xfa54asrgp
-
MD5
0ee8544557d6da1ea464f484f9de7f05
-
SHA1
e8fbb7c9e4359c6a124379e77382dd266509f45c
-
SHA256
d7e1a0dfadf975340155e8955e913cb07f6e830f4d2b37b47a0ce8e61eae4fa6
-
SHA512
dba88f748f18a3a0734f0e334f3463204f7385b9bf695e3344e22bc88dd07b7a18ebfeeabc5b44aaec9e9125735f39b4492dfba3dc005a8cc277ebd472fb5b48
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiC:WIwgMEuy+inDfp3/XoCw57XYBwKC
Behavioral task
behavioral1
Sample
d7e1a0dfadf975340155e8955e913cb07f6e830f4d2b37b47a0ce8e61eae4fa6.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
d7e1a0dfadf975340155e8955e913cb07f6e830f4d2b37b47a0ce8e61eae4fa6
-
Size
1.2MB
-
MD5
0ee8544557d6da1ea464f484f9de7f05
-
SHA1
e8fbb7c9e4359c6a124379e77382dd266509f45c
-
SHA256
d7e1a0dfadf975340155e8955e913cb07f6e830f4d2b37b47a0ce8e61eae4fa6
-
SHA512
dba88f748f18a3a0734f0e334f3463204f7385b9bf695e3344e22bc88dd07b7a18ebfeeabc5b44aaec9e9125735f39b4492dfba3dc005a8cc277ebd472fb5b48
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiC:WIwgMEuy+inDfp3/XoCw57XYBwKC
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2