General
-
Target
434ecc42abede0924f2e2cb54000fabb937bf2462632c26cd43011ecb80f7d54
-
Size
1.2MB
-
Sample
250118-1qx96awka1
-
MD5
7a61a841649733d6eac554c437b820d2
-
SHA1
ab90598a58efe1e6390f4ee11df30836d9e20133
-
SHA256
434ecc42abede0924f2e2cb54000fabb937bf2462632c26cd43011ecb80f7d54
-
SHA512
2773f958eaec5a00770096fc228eb3dc3fcfeb97e3f8d2830e35085c774059a187628872f94b0e9f503cedd876933ca417de385a7465fa3e9933fd7e93356b07
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtia:WIwgMEuy+inDfp3/XoCw57XYBwKa
Behavioral task
behavioral1
Sample
434ecc42abede0924f2e2cb54000fabb937bf2462632c26cd43011ecb80f7d54.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
434ecc42abede0924f2e2cb54000fabb937bf2462632c26cd43011ecb80f7d54
-
Size
1.2MB
-
MD5
7a61a841649733d6eac554c437b820d2
-
SHA1
ab90598a58efe1e6390f4ee11df30836d9e20133
-
SHA256
434ecc42abede0924f2e2cb54000fabb937bf2462632c26cd43011ecb80f7d54
-
SHA512
2773f958eaec5a00770096fc228eb3dc3fcfeb97e3f8d2830e35085c774059a187628872f94b0e9f503cedd876933ca417de385a7465fa3e9933fd7e93356b07
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtia:WIwgMEuy+inDfp3/XoCw57XYBwKa
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2