General
-
Target
29be5508137a704cc968c3a0ad4afcc938a1dd4b1e6838ce091b76e4da7ee3ce
-
Size
1.9MB
-
Sample
250113-b1l77syrds
-
MD5
05258c560c2cba1b8b59b3db4e612da6
-
SHA1
34f9bff2a5b66e311017f00e09c954cfbbd66f8a
-
SHA256
29be5508137a704cc968c3a0ad4afcc938a1dd4b1e6838ce091b76e4da7ee3ce
-
SHA512
759f59b381641fa8ca95a35dea8bfe85872cfe576892bc03ebc6c50dda43db734876f320dd6d85a6d57fa23c060920c655d09488712be9e7376433d634600259
-
SSDEEP
24576:hM8wcsjBocoT3cgEeqroaV3NSPDo7gKVbZETckLZzzb78QREND:ySbfMhywSZ7LE
Static task
static1
Behavioral task
behavioral1
Sample
29be5508137a704cc968c3a0ad4afcc938a1dd4b1e6838ce091b76e4da7ee3ce.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
29be5508137a704cc968c3a0ad4afcc938a1dd4b1e6838ce091b76e4da7ee3ce
-
Size
1.9MB
-
MD5
05258c560c2cba1b8b59b3db4e612da6
-
SHA1
34f9bff2a5b66e311017f00e09c954cfbbd66f8a
-
SHA256
29be5508137a704cc968c3a0ad4afcc938a1dd4b1e6838ce091b76e4da7ee3ce
-
SHA512
759f59b381641fa8ca95a35dea8bfe85872cfe576892bc03ebc6c50dda43db734876f320dd6d85a6d57fa23c060920c655d09488712be9e7376433d634600259
-
SSDEEP
24576:hM8wcsjBocoT3cgEeqroaV3NSPDo7gKVbZETckLZzzb78QREND:ySbfMhywSZ7LE
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1