General
-
Target
db48c9ab3eecc9082d7150b3685126f457022f0f45c043ec9a2cadaaebd80a3a
-
Size
10.7MB
-
Sample
250206-vkj8fsspgk
-
MD5
fd7fe641e788cc04b66483e706881314
-
SHA1
96e4ab063906026b2c88a13e6fdc4595489c891f
-
SHA256
db48c9ab3eecc9082d7150b3685126f457022f0f45c043ec9a2cadaaebd80a3a
-
SHA512
c6872064ea29bc5bb7b9c941f19a485ccb2b8b59fd2281a9eec4f06ef1546d2c84b56476d70af2df56f6f72bfcf5a115367e815e55b911ccf16225e209fbc77b
-
SSDEEP
196608:CKXbeO71HfVFhBFRX9eQy7Mbz42Sbt2e1LQqbU/qG7jJVnGXTbllVq5L:f7TPBFR/y73bjQqcTj7uRlQ
Static task
static1
Behavioral task
behavioral1
Sample
db48c9ab3eecc9082d7150b3685126f457022f0f45c043ec9a2cadaaebd80a3a.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
db48c9ab3eecc9082d7150b3685126f457022f0f45c043ec9a2cadaaebd80a3a
-
Size
10.7MB
-
MD5
fd7fe641e788cc04b66483e706881314
-
SHA1
96e4ab063906026b2c88a13e6fdc4595489c891f
-
SHA256
db48c9ab3eecc9082d7150b3685126f457022f0f45c043ec9a2cadaaebd80a3a
-
SHA512
c6872064ea29bc5bb7b9c941f19a485ccb2b8b59fd2281a9eec4f06ef1546d2c84b56476d70af2df56f6f72bfcf5a115367e815e55b911ccf16225e209fbc77b
-
SSDEEP
196608:CKXbeO71HfVFhBFRX9eQy7Mbz42Sbt2e1LQqbU/qG7jJVnGXTbllVq5L:f7TPBFR/y73bjQqcTj7uRlQ
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1