General
-
Target
c02dee7fbf83c972b95784e11545a64397d7f7f757d9e46921850b21ce56ec26
-
Size
1.2MB
-
Sample
241230-yh1zzaykhx
-
MD5
7259b7032ce37eaa6e6b20d60f0eb7f1
-
SHA1
329eba0c1c03b7a0ca770fc7f8f96180a7534ba8
-
SHA256
c02dee7fbf83c972b95784e11545a64397d7f7f757d9e46921850b21ce56ec26
-
SHA512
3635aa0e9d3c5ea298bafd319eb51fa141078f287365073523652103c7941aa6b8c6706c6eefd9e3ab6328675926780b4e8f95f5b3592f408fceaa5a7b76706f
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtib:WIwgMEuy+inDfp3/XoCw57XYBwKb
Behavioral task
behavioral1
Sample
c02dee7fbf83c972b95784e11545a64397d7f7f757d9e46921850b21ce56ec26.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
c02dee7fbf83c972b95784e11545a64397d7f7f757d9e46921850b21ce56ec26
-
Size
1.2MB
-
MD5
7259b7032ce37eaa6e6b20d60f0eb7f1
-
SHA1
329eba0c1c03b7a0ca770fc7f8f96180a7534ba8
-
SHA256
c02dee7fbf83c972b95784e11545a64397d7f7f757d9e46921850b21ce56ec26
-
SHA512
3635aa0e9d3c5ea298bafd319eb51fa141078f287365073523652103c7941aa6b8c6706c6eefd9e3ab6328675926780b4e8f95f5b3592f408fceaa5a7b76706f
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtib:WIwgMEuy+inDfp3/XoCw57XYBwKb
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2