General
-
Target
aaada459f96c646303fd11d6213ce41dc0338be81180f933176f876f61616567
-
Size
1.2MB
-
Sample
250206-dqfzjs1jhw
-
MD5
226a9b2b0ff3e0593f23771ab573c98d
-
SHA1
b204022576e720cdb40695ef585b6ee452bda005
-
SHA256
aaada459f96c646303fd11d6213ce41dc0338be81180f933176f876f61616567
-
SHA512
b5f9788664b9dae1f5476adcace4e323a081c8457e0671f9009be7b2acda0f0a56deb3dcf7674d45356b292e21f2068ef250923f90d7f5b71b742b6fd657c932
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiK:WIwgMEuy+inDfp3/XoCw57XYBwKK
Behavioral task
behavioral1
Sample
aaada459f96c646303fd11d6213ce41dc0338be81180f933176f876f61616567.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
aaada459f96c646303fd11d6213ce41dc0338be81180f933176f876f61616567
-
Size
1.2MB
-
MD5
226a9b2b0ff3e0593f23771ab573c98d
-
SHA1
b204022576e720cdb40695ef585b6ee452bda005
-
SHA256
aaada459f96c646303fd11d6213ce41dc0338be81180f933176f876f61616567
-
SHA512
b5f9788664b9dae1f5476adcace4e323a081c8457e0671f9009be7b2acda0f0a56deb3dcf7674d45356b292e21f2068ef250923f90d7f5b71b742b6fd657c932
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiK:WIwgMEuy+inDfp3/XoCw57XYBwKK
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2