General
-
Target
bed45c3826ddecc24207bf1d56b3ca6eb3e6b5649bb70e328ad0ee42eaa38877
-
Size
1.2MB
-
Sample
250120-xfla3atjcr
-
MD5
d352a28833a26fdb7a82c6a11c87fdb1
-
SHA1
9d7b31d652e9a216f127995111785c8f6df1625d
-
SHA256
bed45c3826ddecc24207bf1d56b3ca6eb3e6b5649bb70e328ad0ee42eaa38877
-
SHA512
7efe56a246e56447cd00ec1db04d548799e7e8f4427c27f65ea6104390b8d92c6d40c7f9ec80896ace84ec4bc024f17fe8158745dabf9d01688de403edc791f8
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiv:WIwgMEuy+inDfp3/XoCw57XYBwKv
Behavioral task
behavioral1
Sample
bed45c3826ddecc24207bf1d56b3ca6eb3e6b5649bb70e328ad0ee42eaa38877.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
bed45c3826ddecc24207bf1d56b3ca6eb3e6b5649bb70e328ad0ee42eaa38877
-
Size
1.2MB
-
MD5
d352a28833a26fdb7a82c6a11c87fdb1
-
SHA1
9d7b31d652e9a216f127995111785c8f6df1625d
-
SHA256
bed45c3826ddecc24207bf1d56b3ca6eb3e6b5649bb70e328ad0ee42eaa38877
-
SHA512
7efe56a246e56447cd00ec1db04d548799e7e8f4427c27f65ea6104390b8d92c6d40c7f9ec80896ace84ec4bc024f17fe8158745dabf9d01688de403edc791f8
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiv:WIwgMEuy+inDfp3/XoCw57XYBwKv
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2