General
-
Target
f31a437a2001302650dc4d941bf7ea93d727eef8b496201309d6b70d8f52a51e
-
Size
1.2MB
-
Sample
250217-j9w3rswres
-
MD5
81b8929a4f14f14b4a4f909a9e3984b6
-
SHA1
4cbda3359536d0a8b5cd89c68ef37f7a839f522e
-
SHA256
f31a437a2001302650dc4d941bf7ea93d727eef8b496201309d6b70d8f52a51e
-
SHA512
48b77097a24468e545f18be83d7ba45c3badf56cce5985ad72df3a131d6630a6d82bac3a725891551c245e005a6557fbd73f205ffce6b90bfd0f55d13b50a2c0
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiO:WIwgMEuy+inDfp3/XoCw57XYBwKO
Behavioral task
behavioral1
Sample
f31a437a2001302650dc4d941bf7ea93d727eef8b496201309d6b70d8f52a51e.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
f31a437a2001302650dc4d941bf7ea93d727eef8b496201309d6b70d8f52a51e
-
Size
1.2MB
-
MD5
81b8929a4f14f14b4a4f909a9e3984b6
-
SHA1
4cbda3359536d0a8b5cd89c68ef37f7a839f522e
-
SHA256
f31a437a2001302650dc4d941bf7ea93d727eef8b496201309d6b70d8f52a51e
-
SHA512
48b77097a24468e545f18be83d7ba45c3badf56cce5985ad72df3a131d6630a6d82bac3a725891551c245e005a6557fbd73f205ffce6b90bfd0f55d13b50a2c0
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiO:WIwgMEuy+inDfp3/XoCw57XYBwKO
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2