General
-
Target
1161213c2881d82ed1d46e3ff86ed009e628ce7845e63648b9feaeb3502b934c
-
Size
1.5MB
-
Sample
241231-c639casrgs
-
MD5
3e195c09e50918131e3d3019660b9d6d
-
SHA1
da9cafd0399e05226830fb20bb925fe44cf67261
-
SHA256
1161213c2881d82ed1d46e3ff86ed009e628ce7845e63648b9feaeb3502b934c
-
SHA512
268e322d0c375d8e0044f08b9d6f8b549e0ecfb52bff39311b81d0e558a0ebfc02782fffecbc6602c902030ad8716a48a779b3ac544a1584e2e35bdc1b50b05e
-
SSDEEP
24576:VQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cV5DILUsWAsT:VQZAdVyVT9n/Gg0P+WhoeD4Fy
Static task
static1
Behavioral task
behavioral1
Sample
1161213c2881d82ed1d46e3ff86ed009e628ce7845e63648b9feaeb3502b934c.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
1161213c2881d82ed1d46e3ff86ed009e628ce7845e63648b9feaeb3502b934c
-
Size
1.5MB
-
MD5
3e195c09e50918131e3d3019660b9d6d
-
SHA1
da9cafd0399e05226830fb20bb925fe44cf67261
-
SHA256
1161213c2881d82ed1d46e3ff86ed009e628ce7845e63648b9feaeb3502b934c
-
SHA512
268e322d0c375d8e0044f08b9d6f8b549e0ecfb52bff39311b81d0e558a0ebfc02782fffecbc6602c902030ad8716a48a779b3ac544a1584e2e35bdc1b50b05e
-
SSDEEP
24576:VQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cV5DILUsWAsT:VQZAdVyVT9n/Gg0P+WhoeD4Fy
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1