General
-
Target
71e9b6a6f9e4b13e9d3e9f017e317e58af60b3bdd957d4d80e98b00ca85a6198
-
Size
3.6MB
-
Sample
250331-wx1xeaxnz3
-
MD5
b4e28b73267ce78a67f827dd2d8c2d56
-
SHA1
14e693003624c4639ef62236c8a63d40678a99b1
-
SHA256
71e9b6a6f9e4b13e9d3e9f017e317e58af60b3bdd957d4d80e98b00ca85a6198
-
SHA512
54b8d0bf4c352121efbd8fd51a6ca3c1ea23510804993a920d3bc4a0079547b0ad96fe8d43bd8edf44d9491c8bdf7aed3e9ca314a4894f5c877b51e38348fcb0
-
SSDEEP
49152:lCwsbCANnKXferL7Vwe/Gg0P+WhSG8oIK+izmHMTp:4ws2ANnKXOaeOgmhfIti
Static task
static1
Malware Config
Targets
-
-
Target
71e9b6a6f9e4b13e9d3e9f017e317e58af60b3bdd957d4d80e98b00ca85a6198
-
Size
3.6MB
-
MD5
b4e28b73267ce78a67f827dd2d8c2d56
-
SHA1
14e693003624c4639ef62236c8a63d40678a99b1
-
SHA256
71e9b6a6f9e4b13e9d3e9f017e317e58af60b3bdd957d4d80e98b00ca85a6198
-
SHA512
54b8d0bf4c352121efbd8fd51a6ca3c1ea23510804993a920d3bc4a0079547b0ad96fe8d43bd8edf44d9491c8bdf7aed3e9ca314a4894f5c877b51e38348fcb0
-
SSDEEP
49152:lCwsbCANnKXferL7Vwe/Gg0P+WhSG8oIK+izmHMTp:4ws2ANnKXOaeOgmhfIti
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1