General
-
Target
1647de7b0df48df42bfb60cca35a332b86049cc0233bc00a2f17a70d08ab8250
-
Size
2.6MB
-
Sample
241228-2ntdvstnev
-
MD5
a83d19c9ba27752533da7ecca0f7d480
-
SHA1
ede0811ca33376414d7fa79dd58bc5b18799fbda
-
SHA256
1647de7b0df48df42bfb60cca35a332b86049cc0233bc00a2f17a70d08ab8250
-
SHA512
039475c6c99faf322bb9afdacf88029ec3576835d0b7587104b72c6b93b1f9ed40e19595d5be1c099603f390a9a28e8d22853ddedced4d96bbe0f56020c310ab
-
SSDEEP
49152:OCwsbCANnKXferL7Vwe/Gg0P+WhIsABTuW:pws2ANnKXOaeOgmhI1BTuW
Static task
static1
Behavioral task
behavioral1
Sample
1647de7b0df48df42bfb60cca35a332b86049cc0233bc00a2f17a70d08ab8250.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
1647de7b0df48df42bfb60cca35a332b86049cc0233bc00a2f17a70d08ab8250
-
Size
2.6MB
-
MD5
a83d19c9ba27752533da7ecca0f7d480
-
SHA1
ede0811ca33376414d7fa79dd58bc5b18799fbda
-
SHA256
1647de7b0df48df42bfb60cca35a332b86049cc0233bc00a2f17a70d08ab8250
-
SHA512
039475c6c99faf322bb9afdacf88029ec3576835d0b7587104b72c6b93b1f9ed40e19595d5be1c099603f390a9a28e8d22853ddedced4d96bbe0f56020c310ab
-
SSDEEP
49152:OCwsbCANnKXferL7Vwe/Gg0P+WhIsABTuW:pws2ANnKXOaeOgmhI1BTuW
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1