General
-
Target
f15677b84c17e0678d1a86b8ee11779654dd7636db94bac96e43dd1fc004327f
-
Size
1.6MB
-
Sample
250128-hqmjjs1ndr
-
MD5
51c6690b6dc71fea663dfd2ae5a31660
-
SHA1
5d1a3987e9cc09ee5027544f94e8a96a5ee42d97
-
SHA256
f15677b84c17e0678d1a86b8ee11779654dd7636db94bac96e43dd1fc004327f
-
SHA512
e4d9d1b6547ddc6a12616c34b0d74fb0f6e1661f28d4a5d1cc29309ce92bb5da257688dd6663c4a99c22b9a0114609083b4f27fbe80e5bd55ee3ad051210789d
-
SSDEEP
24576:bQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVVcQ9:bQZAdVyVT9n/Gg0P+WhomF
Static task
static1
Behavioral task
behavioral1
Sample
f15677b84c17e0678d1a86b8ee11779654dd7636db94bac96e43dd1fc004327f.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
f15677b84c17e0678d1a86b8ee11779654dd7636db94bac96e43dd1fc004327f
-
Size
1.6MB
-
MD5
51c6690b6dc71fea663dfd2ae5a31660
-
SHA1
5d1a3987e9cc09ee5027544f94e8a96a5ee42d97
-
SHA256
f15677b84c17e0678d1a86b8ee11779654dd7636db94bac96e43dd1fc004327f
-
SHA512
e4d9d1b6547ddc6a12616c34b0d74fb0f6e1661f28d4a5d1cc29309ce92bb5da257688dd6663c4a99c22b9a0114609083b4f27fbe80e5bd55ee3ad051210789d
-
SSDEEP
24576:bQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVVcQ9:bQZAdVyVT9n/Gg0P+WhomF
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1