General
-
Target
6bb31473405741054f5e418bd916df1e1fa0bd27a802fdfae088c9ac3c809dbf
-
Size
1.2MB
-
Sample
250328-bk7tzazybs
-
MD5
86e0ba1dc000f39bcd0c75d895b7e62d
-
SHA1
d4e4899d9f3ebadea132146b48910dd92e9891fe
-
SHA256
6bb31473405741054f5e418bd916df1e1fa0bd27a802fdfae088c9ac3c809dbf
-
SHA512
1455c5f8c32c4dbc188b2bb89660d51b410d8e20982ab78b9938b2b4252f5f0883b7560f966b06bce2113821f2103c9abecbdcaa02aafd74269e2ba51d4ee438
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiL:WIwgMEuy+inDfp3/XoCw57XYBwKL
Behavioral task
behavioral1
Sample
6bb31473405741054f5e418bd916df1e1fa0bd27a802fdfae088c9ac3c809dbf.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
6bb31473405741054f5e418bd916df1e1fa0bd27a802fdfae088c9ac3c809dbf
-
Size
1.2MB
-
MD5
86e0ba1dc000f39bcd0c75d895b7e62d
-
SHA1
d4e4899d9f3ebadea132146b48910dd92e9891fe
-
SHA256
6bb31473405741054f5e418bd916df1e1fa0bd27a802fdfae088c9ac3c809dbf
-
SHA512
1455c5f8c32c4dbc188b2bb89660d51b410d8e20982ab78b9938b2b4252f5f0883b7560f966b06bce2113821f2103c9abecbdcaa02aafd74269e2ba51d4ee438
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiL:WIwgMEuy+inDfp3/XoCw57XYBwKL
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2