General
-
Target
27c851614ff8f44f5c0b6d52dc7439fba41f73fcb31e132c44a2d545c269646c
-
Size
1.2MB
-
Sample
250101-wddmrsykfk
-
MD5
c3aea23cca9749a224e9ef42db7db11a
-
SHA1
d2f9798e16c22ecace256b8914b6a6cb94d4c142
-
SHA256
27c851614ff8f44f5c0b6d52dc7439fba41f73fcb31e132c44a2d545c269646c
-
SHA512
d217d37df8b465f7f4b58be497ccdfda2090c24440e1620472893fad79110505c737921e4c54dda6cb65c33ddb5fb6a152abeb8535c7f7cfb7b036d340fd15cd
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiQ:WIwgMEuy+inDfp3/XoCw57XYBwKQ
Behavioral task
behavioral1
Sample
27c851614ff8f44f5c0b6d52dc7439fba41f73fcb31e132c44a2d545c269646c.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
27c851614ff8f44f5c0b6d52dc7439fba41f73fcb31e132c44a2d545c269646c
-
Size
1.2MB
-
MD5
c3aea23cca9749a224e9ef42db7db11a
-
SHA1
d2f9798e16c22ecace256b8914b6a6cb94d4c142
-
SHA256
27c851614ff8f44f5c0b6d52dc7439fba41f73fcb31e132c44a2d545c269646c
-
SHA512
d217d37df8b465f7f4b58be497ccdfda2090c24440e1620472893fad79110505c737921e4c54dda6cb65c33ddb5fb6a152abeb8535c7f7cfb7b036d340fd15cd
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiQ:WIwgMEuy+inDfp3/XoCw57XYBwKQ
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2