General
-
Target
4e1b8e67dca1a6e1cc0ce2c95a32217fbd7b933cce04ba7e9a52ca7bf4686aa2
-
Size
1.2MB
-
Sample
250101-hl9taazqdj
-
MD5
1da7fe0412837f925cd780a695ef11a5
-
SHA1
9f12a6331bc1e9a557e52a96d7ccc2d3e7131a5f
-
SHA256
4e1b8e67dca1a6e1cc0ce2c95a32217fbd7b933cce04ba7e9a52ca7bf4686aa2
-
SHA512
5a5e8f3006799fc48bdfd8e43aa72d9189a29d1e6d004f6f01635e3e0acb4cb1e2bd0c4c8e5b663c8b9f938c035de62816da70e5e1642402d2dee6137bd5b669
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtip:WIwgMEuy+inDfp3/XoCw57XYBwKp
Behavioral task
behavioral1
Sample
4e1b8e67dca1a6e1cc0ce2c95a32217fbd7b933cce04ba7e9a52ca7bf4686aa2.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
4e1b8e67dca1a6e1cc0ce2c95a32217fbd7b933cce04ba7e9a52ca7bf4686aa2
-
Size
1.2MB
-
MD5
1da7fe0412837f925cd780a695ef11a5
-
SHA1
9f12a6331bc1e9a557e52a96d7ccc2d3e7131a5f
-
SHA256
4e1b8e67dca1a6e1cc0ce2c95a32217fbd7b933cce04ba7e9a52ca7bf4686aa2
-
SHA512
5a5e8f3006799fc48bdfd8e43aa72d9189a29d1e6d004f6f01635e3e0acb4cb1e2bd0c4c8e5b663c8b9f938c035de62816da70e5e1642402d2dee6137bd5b669
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtip:WIwgMEuy+inDfp3/XoCw57XYBwKp
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2