General
-
Target
1aeb146c5cf9bff6c6d4956912c92c1474215eaa7c0999d4dc179f5a8a7c8794
-
Size
1.2MB
-
Sample
241229-xhc3gavrfm
-
MD5
2b721be7f5f8d6446b7f622c7a9f846d
-
SHA1
b2b761316ed28f49291689691a4459c9d7bf539f
-
SHA256
1aeb146c5cf9bff6c6d4956912c92c1474215eaa7c0999d4dc179f5a8a7c8794
-
SHA512
21b7dc45a1015d5e58ed35f8a66c1f25ea9d7e049323c12bdb2af5c5a259951386d242a1f3033bb128f6267278c1bfae25e722a4a75873141fcbf00bb3782a6c
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiP:WIwgMEuy+inDfp3/XoCw57XYBwKP
Behavioral task
behavioral1
Sample
1aeb146c5cf9bff6c6d4956912c92c1474215eaa7c0999d4dc179f5a8a7c8794.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
1aeb146c5cf9bff6c6d4956912c92c1474215eaa7c0999d4dc179f5a8a7c8794
-
Size
1.2MB
-
MD5
2b721be7f5f8d6446b7f622c7a9f846d
-
SHA1
b2b761316ed28f49291689691a4459c9d7bf539f
-
SHA256
1aeb146c5cf9bff6c6d4956912c92c1474215eaa7c0999d4dc179f5a8a7c8794
-
SHA512
21b7dc45a1015d5e58ed35f8a66c1f25ea9d7e049323c12bdb2af5c5a259951386d242a1f3033bb128f6267278c1bfae25e722a4a75873141fcbf00bb3782a6c
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiP:WIwgMEuy+inDfp3/XoCw57XYBwKP
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2