General
-
Target
7126ec4e2303c7c71747097af80791437b82b85d4fc0d9b666b05a33a50fde77.exe
-
Size
2.7MB
-
Sample
250111-bmlphswqaw
-
MD5
8d0a89e44cda152aa36a8796dd23c856
-
SHA1
527f6f5c6766891589d208f157e28f6e23316232
-
SHA256
7126ec4e2303c7c71747097af80791437b82b85d4fc0d9b666b05a33a50fde77
-
SHA512
165fc0f88772b9c3dc81985ee11fd80ee48c15fd2de55c49e93abb3c65276a50aea8770c39b10ea2b8d98db9afa2a15c9465769f1928be920314231818dd04a3
-
SSDEEP
49152:LCwsbCANnKXferL7Vwe/Gg0P+WhlL2ozSd:Ows2ANnKXOaeOgmhlLTM
Static task
static1
Behavioral task
behavioral1
Sample
7126ec4e2303c7c71747097af80791437b82b85d4fc0d9b666b05a33a50fde77.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
7126ec4e2303c7c71747097af80791437b82b85d4fc0d9b666b05a33a50fde77.exe
-
Size
2.7MB
-
MD5
8d0a89e44cda152aa36a8796dd23c856
-
SHA1
527f6f5c6766891589d208f157e28f6e23316232
-
SHA256
7126ec4e2303c7c71747097af80791437b82b85d4fc0d9b666b05a33a50fde77
-
SHA512
165fc0f88772b9c3dc81985ee11fd80ee48c15fd2de55c49e93abb3c65276a50aea8770c39b10ea2b8d98db9afa2a15c9465769f1928be920314231818dd04a3
-
SSDEEP
49152:LCwsbCANnKXferL7Vwe/Gg0P+WhlL2ozSd:Ows2ANnKXOaeOgmhlLTM
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1