General
-
Target
ccc1f5229ebf92499b45692c0499897a05c57e94762077d547fa8ccc05328c76
-
Size
1.2MB
-
Sample
250122-b4hzys1pdx
-
MD5
07422f506c879c6199d0d84c9057eb2c
-
SHA1
5f75d6a925960461e44554f1e7046fa1f3d05ad0
-
SHA256
ccc1f5229ebf92499b45692c0499897a05c57e94762077d547fa8ccc05328c76
-
SHA512
54d78f1d63533f61090226dcfc23e8fab6e1bac42045e94b07ae965e65aa4ab0a27e5fa63abbfb55e95d2b5506e9a5981b41bff3f4663f22aab5a1d7fb36fa6d
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiG:WIwgMEuy+inDfp3/XoCw57XYBwKG
Behavioral task
behavioral1
Sample
ccc1f5229ebf92499b45692c0499897a05c57e94762077d547fa8ccc05328c76.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
ccc1f5229ebf92499b45692c0499897a05c57e94762077d547fa8ccc05328c76
-
Size
1.2MB
-
MD5
07422f506c879c6199d0d84c9057eb2c
-
SHA1
5f75d6a925960461e44554f1e7046fa1f3d05ad0
-
SHA256
ccc1f5229ebf92499b45692c0499897a05c57e94762077d547fa8ccc05328c76
-
SHA512
54d78f1d63533f61090226dcfc23e8fab6e1bac42045e94b07ae965e65aa4ab0a27e5fa63abbfb55e95d2b5506e9a5981b41bff3f4663f22aab5a1d7fb36fa6d
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiG:WIwgMEuy+inDfp3/XoCw57XYBwKG
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2