General
-
Target
85c5e1f81fcdd3ccbef8fde99c9cdf179e63d29ba0a8a08b528ccbc807d96e9f
-
Size
1.2MB
-
Sample
250302-y12zzstvfy
-
MD5
0e707e281262fba39658270f0b8781fd
-
SHA1
53364867f5580592facac0346b2adfd3588b3f82
-
SHA256
85c5e1f81fcdd3ccbef8fde99c9cdf179e63d29ba0a8a08b528ccbc807d96e9f
-
SHA512
fceed2e043e01e2d70f10aaa8050a98145515e69114740af90c6809a78d45225479ba660ff02d8b20a9e3dfb55bd9206e17625a16ea289abf704e9c531a6175e
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiB:WIwgMEuy+inDfp3/XoCw57XYBwKB
Behavioral task
behavioral1
Sample
85c5e1f81fcdd3ccbef8fde99c9cdf179e63d29ba0a8a08b528ccbc807d96e9f.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
85c5e1f81fcdd3ccbef8fde99c9cdf179e63d29ba0a8a08b528ccbc807d96e9f
-
Size
1.2MB
-
MD5
0e707e281262fba39658270f0b8781fd
-
SHA1
53364867f5580592facac0346b2adfd3588b3f82
-
SHA256
85c5e1f81fcdd3ccbef8fde99c9cdf179e63d29ba0a8a08b528ccbc807d96e9f
-
SHA512
fceed2e043e01e2d70f10aaa8050a98145515e69114740af90c6809a78d45225479ba660ff02d8b20a9e3dfb55bd9206e17625a16ea289abf704e9c531a6175e
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiB:WIwgMEuy+inDfp3/XoCw57XYBwKB
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2