General
-
Target
2928b84faac7baa13342981ba591c1e7fef4cc91447c7f9e67a4f374c4ae8635
-
Size
2.7MB
-
Sample
241229-b39fhsylem
-
MD5
52a429d5b25adb78fc0fec50b7c09c13
-
SHA1
1b620bc972a049b23487a59673b97daa115266de
-
SHA256
2928b84faac7baa13342981ba591c1e7fef4cc91447c7f9e67a4f374c4ae8635
-
SHA512
2458912827969449ce705c50e080f4c054421d653eca83e0d45e739e2ceaa5673c4c86f959869725cdb5532d95ef6ed702684838d8a2db4bef217139be74bdcf
-
SSDEEP
49152:VCwsbCANnKXferL7Vwe/Gg0P+WhzsABTux:Iws2ANnKXOaeOgmhz1BTux
Static task
static1
Behavioral task
behavioral1
Sample
2928b84faac7baa13342981ba591c1e7fef4cc91447c7f9e67a4f374c4ae8635.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
2928b84faac7baa13342981ba591c1e7fef4cc91447c7f9e67a4f374c4ae8635
-
Size
2.7MB
-
MD5
52a429d5b25adb78fc0fec50b7c09c13
-
SHA1
1b620bc972a049b23487a59673b97daa115266de
-
SHA256
2928b84faac7baa13342981ba591c1e7fef4cc91447c7f9e67a4f374c4ae8635
-
SHA512
2458912827969449ce705c50e080f4c054421d653eca83e0d45e739e2ceaa5673c4c86f959869725cdb5532d95ef6ed702684838d8a2db4bef217139be74bdcf
-
SSDEEP
49152:VCwsbCANnKXferL7Vwe/Gg0P+WhzsABTux:Iws2ANnKXOaeOgmhz1BTux
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1