General
-
Target
9b04fd775ed3e774d7a649d7332087efce818f011387d948b47b1af9da99fd04
-
Size
1.7MB
-
Sample
250107-q13yaavrar
-
MD5
2b703c5c00841d1439afd2bfd7cb4a7e
-
SHA1
c013b484287fc793cf06bc1b9d3a9016b7d7cb01
-
SHA256
9b04fd775ed3e774d7a649d7332087efce818f011387d948b47b1af9da99fd04
-
SHA512
5a77690bd9fa9c48ac3119f61463f61ebfe0d8d3a34076387abfb45f350fa3d00d4ff68071032bbffaf681cd9a79b99297a73987e7bd088b70f536791fe6be83
-
SSDEEP
24576:zM8wcsjBocoT3cgEeqroaV3NSPDo7gKVbZETckLZzzb78Qb:4SbfMhywSZ7B
Static task
static1
Behavioral task
behavioral1
Sample
9b04fd775ed3e774d7a649d7332087efce818f011387d948b47b1af9da99fd04.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
9b04fd775ed3e774d7a649d7332087efce818f011387d948b47b1af9da99fd04
-
Size
1.7MB
-
MD5
2b703c5c00841d1439afd2bfd7cb4a7e
-
SHA1
c013b484287fc793cf06bc1b9d3a9016b7d7cb01
-
SHA256
9b04fd775ed3e774d7a649d7332087efce818f011387d948b47b1af9da99fd04
-
SHA512
5a77690bd9fa9c48ac3119f61463f61ebfe0d8d3a34076387abfb45f350fa3d00d4ff68071032bbffaf681cd9a79b99297a73987e7bd088b70f536791fe6be83
-
SSDEEP
24576:zM8wcsjBocoT3cgEeqroaV3NSPDo7gKVbZETckLZzzb78Qb:4SbfMhywSZ7B
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1