General
-
Target
d9d7513d8ad9929eb3411c6438e697158f0804737bc117c8d78ced6cb08d5aee
-
Size
9.2MB
-
Sample
241227-hnfm8asqfr
-
MD5
2e7266755778f69dbde7a4561affac45
-
SHA1
2dd869bec710f74dd78b2a795a97420c53b1ae6e
-
SHA256
d9d7513d8ad9929eb3411c6438e697158f0804737bc117c8d78ced6cb08d5aee
-
SHA512
0a21e8184d2fdd063f7cee922f81356cd3b3a7c5396c9120b3f690fb225e7d5264b6e68a3f50245f1fea84f273ca8ecf9d070c1594d1ff2e5ac3250b08ef9cc3
-
SSDEEP
196608:VKXbeO77t/44wIY0LRnHfq37g7oQcfa/ewsWOpsD:e7qzG6eIfa3sWUU
Static task
static1
Behavioral task
behavioral1
Sample
d9d7513d8ad9929eb3411c6438e697158f0804737bc117c8d78ced6cb08d5aee.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
d9d7513d8ad9929eb3411c6438e697158f0804737bc117c8d78ced6cb08d5aee
-
Size
9.2MB
-
MD5
2e7266755778f69dbde7a4561affac45
-
SHA1
2dd869bec710f74dd78b2a795a97420c53b1ae6e
-
SHA256
d9d7513d8ad9929eb3411c6438e697158f0804737bc117c8d78ced6cb08d5aee
-
SHA512
0a21e8184d2fdd063f7cee922f81356cd3b3a7c5396c9120b3f690fb225e7d5264b6e68a3f50245f1fea84f273ca8ecf9d070c1594d1ff2e5ac3250b08ef9cc3
-
SSDEEP
196608:VKXbeO77t/44wIY0LRnHfq37g7oQcfa/ewsWOpsD:e7qzG6eIfa3sWUU
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1