General
-
Target
326e7ce9367b1d03ef5db7dda16b950ddaee958084330613464b5f55167328f9
-
Size
1.2MB
-
Sample
250103-f9k4qatqgj
-
MD5
066ca69688f900b738a74da6eab7982c
-
SHA1
2fc3af1f22275f2801bd49fe79f0f6382af27b42
-
SHA256
326e7ce9367b1d03ef5db7dda16b950ddaee958084330613464b5f55167328f9
-
SHA512
70f61e59e1e2d4f44dbe688a604c37f0ce3cf4bb9cb0be69c4b33796d2f6b93edbf18f1d6f09d6faeba0195eac8c359ac956523e582057b6280b54f4b91cd0f4
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiF:WIwgMEuy+inDfp3/XoCw57XYBwKF
Behavioral task
behavioral1
Sample
326e7ce9367b1d03ef5db7dda16b950ddaee958084330613464b5f55167328f9.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
326e7ce9367b1d03ef5db7dda16b950ddaee958084330613464b5f55167328f9
-
Size
1.2MB
-
MD5
066ca69688f900b738a74da6eab7982c
-
SHA1
2fc3af1f22275f2801bd49fe79f0f6382af27b42
-
SHA256
326e7ce9367b1d03ef5db7dda16b950ddaee958084330613464b5f55167328f9
-
SHA512
70f61e59e1e2d4f44dbe688a604c37f0ce3cf4bb9cb0be69c4b33796d2f6b93edbf18f1d6f09d6faeba0195eac8c359ac956523e582057b6280b54f4b91cd0f4
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiF:WIwgMEuy+inDfp3/XoCw57XYBwKF
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2