General
-
Target
f39b766e8270ae007cd70c47af807a26691a7a773712e44cff8d4adc1e0966fc
-
Size
2.6MB
-
Sample
250331-y4mpgaznt5
-
MD5
57308cf7a05a15b2eeb6e6b76531e39f
-
SHA1
e7aa922074618d212fe660b7bf9838e63d399aec
-
SHA256
f39b766e8270ae007cd70c47af807a26691a7a773712e44cff8d4adc1e0966fc
-
SHA512
09b8f82c1fcb2428575ef200607f7d8a137cb5d67a718680958e2dbf0668001714016b1ecbee874fa448241c9e8eba9c0501abaea032a0da58fb56437e26b26f
-
SSDEEP
49152:eCwsbCANnKXferL7Vwe/Gg0P+WhDDmn2z:Zws2ANnKXOaeOgmhDDmn2z
Static task
static1
Malware Config
Targets
-
-
Target
f39b766e8270ae007cd70c47af807a26691a7a773712e44cff8d4adc1e0966fc
-
Size
2.6MB
-
MD5
57308cf7a05a15b2eeb6e6b76531e39f
-
SHA1
e7aa922074618d212fe660b7bf9838e63d399aec
-
SHA256
f39b766e8270ae007cd70c47af807a26691a7a773712e44cff8d4adc1e0966fc
-
SHA512
09b8f82c1fcb2428575ef200607f7d8a137cb5d67a718680958e2dbf0668001714016b1ecbee874fa448241c9e8eba9c0501abaea032a0da58fb56437e26b26f
-
SSDEEP
49152:eCwsbCANnKXferL7Vwe/Gg0P+WhDDmn2z:Zws2ANnKXOaeOgmhDDmn2z
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1