General
-
Target
232238d6fb0d8a7d7ca28a6d88e2819863b1567e601ad735740c24d438a03119
-
Size
1.4MB
-
Sample
250107-hnzfbsyrgv
-
MD5
4ef5c70f5e2e27c7cb7897ac359e9640
-
SHA1
909d62471408c09bb31a059372caa6f93ab36eac
-
SHA256
232238d6fb0d8a7d7ca28a6d88e2819863b1567e601ad735740c24d438a03119
-
SHA512
a4da741c60c14b4880d3ac27df2faae41d6a8178a641ab1832efd1907516cc97e30ca98d3df0b0cfa3a5316a9fed809520eb7ef3d950b4777d197fb94b1f709a
-
SSDEEP
24576:UOyHutimZ9VSly2hVvHW6qMnSbTBBhBMNuDyzwyzy9C:FHPkVOBTKYC
Static task
static1
Behavioral task
behavioral1
Sample
232238d6fb0d8a7d7ca28a6d88e2819863b1567e601ad735740c24d438a03119.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
232238d6fb0d8a7d7ca28a6d88e2819863b1567e601ad735740c24d438a03119
-
Size
1.4MB
-
MD5
4ef5c70f5e2e27c7cb7897ac359e9640
-
SHA1
909d62471408c09bb31a059372caa6f93ab36eac
-
SHA256
232238d6fb0d8a7d7ca28a6d88e2819863b1567e601ad735740c24d438a03119
-
SHA512
a4da741c60c14b4880d3ac27df2faae41d6a8178a641ab1832efd1907516cc97e30ca98d3df0b0cfa3a5316a9fed809520eb7ef3d950b4777d197fb94b1f709a
-
SSDEEP
24576:UOyHutimZ9VSly2hVvHW6qMnSbTBBhBMNuDyzwyzy9C:FHPkVOBTKYC
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1