General
-
Target
ab9f64140f3719f3cb9aed9a570c4c824d521d8fb41eec8643ccd4bccf7e886e
-
Size
1.2MB
-
Sample
250307-cwj3qasvb1
-
MD5
767a761e12a0dc3c6bdbb2d3bed3cd7f
-
SHA1
143265ea9036a5256861188fa8f2609043014fc3
-
SHA256
ab9f64140f3719f3cb9aed9a570c4c824d521d8fb41eec8643ccd4bccf7e886e
-
SHA512
89af8bf3846f5a5fb9f14ff318829f4b821711899b742ba5cccc53dda3c7668444ecf9bb287422a10d246063e34f9fb956287c27a635e7b4d793e631691537ae
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJti8:WIwgMEuy+inDfp3/XoCw57XYBwK8
Behavioral task
behavioral1
Sample
ab9f64140f3719f3cb9aed9a570c4c824d521d8fb41eec8643ccd4bccf7e886e.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
ab9f64140f3719f3cb9aed9a570c4c824d521d8fb41eec8643ccd4bccf7e886e
-
Size
1.2MB
-
MD5
767a761e12a0dc3c6bdbb2d3bed3cd7f
-
SHA1
143265ea9036a5256861188fa8f2609043014fc3
-
SHA256
ab9f64140f3719f3cb9aed9a570c4c824d521d8fb41eec8643ccd4bccf7e886e
-
SHA512
89af8bf3846f5a5fb9f14ff318829f4b821711899b742ba5cccc53dda3c7668444ecf9bb287422a10d246063e34f9fb956287c27a635e7b4d793e631691537ae
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJti8:WIwgMEuy+inDfp3/XoCw57XYBwK8
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2