General
-
Target
6df05f98ba13ed13858f8b2c5439a3a0541d65365117dbbb1bb73c8252c3f100
-
Size
1.2MB
-
Sample
241230-yh6kfsylax
-
MD5
ff85bf8c36dc7f337db1ff493b2e41b6
-
SHA1
bd6033906e19fe032d6e65ddeb70d6ebfa151883
-
SHA256
6df05f98ba13ed13858f8b2c5439a3a0541d65365117dbbb1bb73c8252c3f100
-
SHA512
cf5416055f9a47d447044660f38b39a3a641beb991f32c48407d1fb2e7d6cf45f7b62292aa519eeea3c5ca2fdaa9135fc462e73327eb91209bc3ec91b258fb50
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJti5:WIwgMEuy+inDfp3/XoCw57XYBwK5
Behavioral task
behavioral1
Sample
6df05f98ba13ed13858f8b2c5439a3a0541d65365117dbbb1bb73c8252c3f100.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
6df05f98ba13ed13858f8b2c5439a3a0541d65365117dbbb1bb73c8252c3f100
-
Size
1.2MB
-
MD5
ff85bf8c36dc7f337db1ff493b2e41b6
-
SHA1
bd6033906e19fe032d6e65ddeb70d6ebfa151883
-
SHA256
6df05f98ba13ed13858f8b2c5439a3a0541d65365117dbbb1bb73c8252c3f100
-
SHA512
cf5416055f9a47d447044660f38b39a3a641beb991f32c48407d1fb2e7d6cf45f7b62292aa519eeea3c5ca2fdaa9135fc462e73327eb91209bc3ec91b258fb50
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJti5:WIwgMEuy+inDfp3/XoCw57XYBwK5
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2