General
-
Target
611fef67875ebd363900d10d2def27d3c15ab60ea943eea67e1c4d64800ea692
-
Size
1.2MB
-
Sample
250331-zdm3zsxxhz
-
MD5
58cee67d0b91126913064a7a8d51a6f6
-
SHA1
1a99302b82842d270fac5507e768b9d7fdfde08f
-
SHA256
611fef67875ebd363900d10d2def27d3c15ab60ea943eea67e1c4d64800ea692
-
SHA512
2ff01f89ee1d0df2e3d8be4cd41f8816deeb18ddb50836ec28864a05484806499d7928a53a14cdf0808c591c0498ab0b5cec067b34e3460ee92b91a242fbcf3c
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtio:WIwgMEuy+inDfp3/XoCw57XYBwKo
Malware Config
Targets
-
-
Target
611fef67875ebd363900d10d2def27d3c15ab60ea943eea67e1c4d64800ea692
-
Size
1.2MB
-
MD5
58cee67d0b91126913064a7a8d51a6f6
-
SHA1
1a99302b82842d270fac5507e768b9d7fdfde08f
-
SHA256
611fef67875ebd363900d10d2def27d3c15ab60ea943eea67e1c4d64800ea692
-
SHA512
2ff01f89ee1d0df2e3d8be4cd41f8816deeb18ddb50836ec28864a05484806499d7928a53a14cdf0808c591c0498ab0b5cec067b34e3460ee92b91a242fbcf3c
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtio:WIwgMEuy+inDfp3/XoCw57XYBwKo
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2