General
-
Target
681bba3e76d4997a871909ac778679d57707b02a8baa5c22ee36cff364b99ecf
-
Size
1.2MB
-
Sample
250301-ywt4ks1saw
-
MD5
20b9aa874e0370f88b60b16603cd1721
-
SHA1
6fd3f6ee239945cf6bceb3fe1f08445b7c3f2849
-
SHA256
681bba3e76d4997a871909ac778679d57707b02a8baa5c22ee36cff364b99ecf
-
SHA512
6b4d69a4badbc12696373456c106456292d6a97e9b2845ff456235a8bdea368864e583365e6ba08c42bde2f6b6bcbb49f9da37930db016637521608050d58dd5
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiY:WIwgMEuy+inDfp3/XoCw57XYBwKY
Behavioral task
behavioral1
Sample
681bba3e76d4997a871909ac778679d57707b02a8baa5c22ee36cff364b99ecf.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
681bba3e76d4997a871909ac778679d57707b02a8baa5c22ee36cff364b99ecf
-
Size
1.2MB
-
MD5
20b9aa874e0370f88b60b16603cd1721
-
SHA1
6fd3f6ee239945cf6bceb3fe1f08445b7c3f2849
-
SHA256
681bba3e76d4997a871909ac778679d57707b02a8baa5c22ee36cff364b99ecf
-
SHA512
6b4d69a4badbc12696373456c106456292d6a97e9b2845ff456235a8bdea368864e583365e6ba08c42bde2f6b6bcbb49f9da37930db016637521608050d58dd5
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiY:WIwgMEuy+inDfp3/XoCw57XYBwKY
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2