General
-
Target
140aa482ead4b84e748a793d1464c5f2627f7356e642ad4dee4fed27f46629ff
-
Size
1.2MB
-
Sample
250207-z6ex3syjhv
-
MD5
e526b27d2db436bad6c01b3ae4115401
-
SHA1
ba885f3665eb83bcb3a2b1ad6a40683a7508c55e
-
SHA256
140aa482ead4b84e748a793d1464c5f2627f7356e642ad4dee4fed27f46629ff
-
SHA512
13c6b440295453ba113c176d231b4d482ce8d163ce6efd20b5c11b9849c855ba97e871320f65c26e2165cda616beabb4f1fc7f51390261f08bad7f8950072b9d
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtig:WIwgMEuy+inDfp3/XoCw57XYBwKg
Behavioral task
behavioral1
Sample
140aa482ead4b84e748a793d1464c5f2627f7356e642ad4dee4fed27f46629ff.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
140aa482ead4b84e748a793d1464c5f2627f7356e642ad4dee4fed27f46629ff
-
Size
1.2MB
-
MD5
e526b27d2db436bad6c01b3ae4115401
-
SHA1
ba885f3665eb83bcb3a2b1ad6a40683a7508c55e
-
SHA256
140aa482ead4b84e748a793d1464c5f2627f7356e642ad4dee4fed27f46629ff
-
SHA512
13c6b440295453ba113c176d231b4d482ce8d163ce6efd20b5c11b9849c855ba97e871320f65c26e2165cda616beabb4f1fc7f51390261f08bad7f8950072b9d
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtig:WIwgMEuy+inDfp3/XoCw57XYBwKg
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2