General
-
Target
88d8170ee5a8b318bccf8f15b073b693796de97079f8688a102109e378e8e608
-
Size
1.2MB
-
Sample
241226-ykpdysxjhx
-
MD5
70b9ee05abea0e615a288670a07106de
-
SHA1
8edba7a82f6dfe73a6a1f9ab7ae72adf3852ac1b
-
SHA256
88d8170ee5a8b318bccf8f15b073b693796de97079f8688a102109e378e8e608
-
SHA512
c094857fe9e54998634a5040a0f94df0a47aa21a33c4ba2c6904432f81153616b58a65be61f09cf52a387f791c8d8e0ad5f23a0fce047471031a36a8100afd55
-
SSDEEP
24576:9WnukjaDKSnYBzaJbjSoGF9LzpELx3N/nHwhHK28URjX+U:MnTjaD/9v6Vcx9HwNhuU
Behavioral task
behavioral1
Sample
88d8170ee5a8b318bccf8f15b073b693796de97079f8688a102109e378e8e608.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
88d8170ee5a8b318bccf8f15b073b693796de97079f8688a102109e378e8e608
-
Size
1.2MB
-
MD5
70b9ee05abea0e615a288670a07106de
-
SHA1
8edba7a82f6dfe73a6a1f9ab7ae72adf3852ac1b
-
SHA256
88d8170ee5a8b318bccf8f15b073b693796de97079f8688a102109e378e8e608
-
SHA512
c094857fe9e54998634a5040a0f94df0a47aa21a33c4ba2c6904432f81153616b58a65be61f09cf52a387f791c8d8e0ad5f23a0fce047471031a36a8100afd55
-
SSDEEP
24576:9WnukjaDKSnYBzaJbjSoGF9LzpELx3N/nHwhHK28URjX+U:MnTjaD/9v6Vcx9HwNhuU
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2