General
-
Target
a7a43924532d980d6d514538a61a2c60dcf80ab843835e6c5c6179e4f9eb581f
-
Size
1.2MB
-
Sample
241229-xmw15svrdw
-
MD5
6def3ce070b59e28b9a8b4d99b1df5d4
-
SHA1
6a30877eb97f27a8e37d8f3e71e7157a00803657
-
SHA256
a7a43924532d980d6d514538a61a2c60dcf80ab843835e6c5c6179e4f9eb581f
-
SHA512
1d24e060f986476fd7df7988889451dbe7352129c2cc5e4241342c8a5ed041bb8be99729cdef7a16309f8a43ab2a43530c04b089e38b70f9e0f9d55066877716
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiN:WIwgMEuy+inDfp3/XoCw57XYBwKN
Behavioral task
behavioral1
Sample
a7a43924532d980d6d514538a61a2c60dcf80ab843835e6c5c6179e4f9eb581f.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
a7a43924532d980d6d514538a61a2c60dcf80ab843835e6c5c6179e4f9eb581f
-
Size
1.2MB
-
MD5
6def3ce070b59e28b9a8b4d99b1df5d4
-
SHA1
6a30877eb97f27a8e37d8f3e71e7157a00803657
-
SHA256
a7a43924532d980d6d514538a61a2c60dcf80ab843835e6c5c6179e4f9eb581f
-
SHA512
1d24e060f986476fd7df7988889451dbe7352129c2cc5e4241342c8a5ed041bb8be99729cdef7a16309f8a43ab2a43530c04b089e38b70f9e0f9d55066877716
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiN:WIwgMEuy+inDfp3/XoCw57XYBwKN
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2