General
-
Target
409057d4b10414ac1e50f15d42ba9563382e2e4438d8190e35698c4efae51ccd
-
Size
1.2MB
-
Sample
250201-wkfeyatmbz
-
MD5
6ba711299c5d2d9cc9492fbd26d293dd
-
SHA1
81aeaf29d08860a8b097bb9f049c161b12ee5cd1
-
SHA256
409057d4b10414ac1e50f15d42ba9563382e2e4438d8190e35698c4efae51ccd
-
SHA512
a804cb15c1b1d71b833303d6771b081fc783453c245c7ae656f10a8510fcc91cea529dd2ab0d14d4681cb12d49079cc390dfcf13d617a9d5ac42dbee9523e21f
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiB:WIwgMEuy+inDfp3/XoCw57XYBwKB
Behavioral task
behavioral1
Sample
409057d4b10414ac1e50f15d42ba9563382e2e4438d8190e35698c4efae51ccd.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
409057d4b10414ac1e50f15d42ba9563382e2e4438d8190e35698c4efae51ccd
-
Size
1.2MB
-
MD5
6ba711299c5d2d9cc9492fbd26d293dd
-
SHA1
81aeaf29d08860a8b097bb9f049c161b12ee5cd1
-
SHA256
409057d4b10414ac1e50f15d42ba9563382e2e4438d8190e35698c4efae51ccd
-
SHA512
a804cb15c1b1d71b833303d6771b081fc783453c245c7ae656f10a8510fcc91cea529dd2ab0d14d4681cb12d49079cc390dfcf13d617a9d5ac42dbee9523e21f
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiB:WIwgMEuy+inDfp3/XoCw57XYBwKB
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2