General
-
Target
0ef592eb7617d71201c49b0efb4d00fcaf784d3320e58eb79fea0cd8963f5df6
-
Size
1.2MB
-
Sample
250402-x5rjdavmx6
-
MD5
6c32cddfc88a5e47431fae6bcaf37e57
-
SHA1
275eee69ff410f0944a6074dcc5a112ecf8622e0
-
SHA256
0ef592eb7617d71201c49b0efb4d00fcaf784d3320e58eb79fea0cd8963f5df6
-
SHA512
eea143e5a36c65fc5b89a34666827cc6df91998d900f6bd0c934a8043b220c7fc93d935a1a7b0bd9c79aa91d39894cf89653c2c9b1544f6b91ee86acb04ec5a7
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJti0:WIwgMEuy+inDfp3/XoCw57XYBwK0
Malware Config
Targets
-
-
Target
0ef592eb7617d71201c49b0efb4d00fcaf784d3320e58eb79fea0cd8963f5df6
-
Size
1.2MB
-
MD5
6c32cddfc88a5e47431fae6bcaf37e57
-
SHA1
275eee69ff410f0944a6074dcc5a112ecf8622e0
-
SHA256
0ef592eb7617d71201c49b0efb4d00fcaf784d3320e58eb79fea0cd8963f5df6
-
SHA512
eea143e5a36c65fc5b89a34666827cc6df91998d900f6bd0c934a8043b220c7fc93d935a1a7b0bd9c79aa91d39894cf89653c2c9b1544f6b91ee86acb04ec5a7
-
SSDEEP
24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJti0:WIwgMEuy+inDfp3/XoCw57XYBwK0
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2