General
-
Target
d281e8dae697ba1e61f3c485687db94ad92f8ac62cdd8290356cf81e839faf83
-
Size
1.2MB
-
Sample
250117-de2f4szrgm
-
MD5
24629bf762f928b07bc235d57903b462
-
SHA1
5f5743055bc1a9b8532d28f4dd86e3f9e59d47a0
-
SHA256
d281e8dae697ba1e61f3c485687db94ad92f8ac62cdd8290356cf81e839faf83
-
SHA512
5d814f11530919e99ae0f7eee1641ce877d1e8d2eef31f9c12c2cfca5f4eb1b999fb66f186e6dfa904bec9df10885a9f39369b7154dede990d2a281fe05fa8c7
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiY:WIwgMEuy+inDfp3/XoCw57XYBwKY
Behavioral task
behavioral1
Sample
d281e8dae697ba1e61f3c485687db94ad92f8ac62cdd8290356cf81e839faf83.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
d281e8dae697ba1e61f3c485687db94ad92f8ac62cdd8290356cf81e839faf83
-
Size
1.2MB
-
MD5
24629bf762f928b07bc235d57903b462
-
SHA1
5f5743055bc1a9b8532d28f4dd86e3f9e59d47a0
-
SHA256
d281e8dae697ba1e61f3c485687db94ad92f8ac62cdd8290356cf81e839faf83
-
SHA512
5d814f11530919e99ae0f7eee1641ce877d1e8d2eef31f9c12c2cfca5f4eb1b999fb66f186e6dfa904bec9df10885a9f39369b7154dede990d2a281fe05fa8c7
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiY:WIwgMEuy+inDfp3/XoCw57XYBwKY
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2