General
-
Target
f0ddd467cee92da6c62ee68a7f0b871f0048889efef8dad35f674e0f9ce17e54
-
Size
1.2MB
-
Sample
250328-gyvdpaswgx
-
MD5
65afd158d35bbdb6b74f471944badf76
-
SHA1
ba8958cea5b5e0308e1926c7608e39761490d20b
-
SHA256
f0ddd467cee92da6c62ee68a7f0b871f0048889efef8dad35f674e0f9ce17e54
-
SHA512
a937eb591e12fc205733b908c63e3c536e95a35cfbc5970c54315ecb9816fcffe2761c38d76af69d9713fba2162602bad8b0cfaa79edaf170b88c782a20ae280
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiP:WIwgMEuy+inDfp3/XoCw57XYBwKP
Behavioral task
behavioral1
Sample
f0ddd467cee92da6c62ee68a7f0b871f0048889efef8dad35f674e0f9ce17e54.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
f0ddd467cee92da6c62ee68a7f0b871f0048889efef8dad35f674e0f9ce17e54
-
Size
1.2MB
-
MD5
65afd158d35bbdb6b74f471944badf76
-
SHA1
ba8958cea5b5e0308e1926c7608e39761490d20b
-
SHA256
f0ddd467cee92da6c62ee68a7f0b871f0048889efef8dad35f674e0f9ce17e54
-
SHA512
a937eb591e12fc205733b908c63e3c536e95a35cfbc5970c54315ecb9816fcffe2761c38d76af69d9713fba2162602bad8b0cfaa79edaf170b88c782a20ae280
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiP:WIwgMEuy+inDfp3/XoCw57XYBwKP
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2