General
-
Target
ad1dab79b1ec0e8a060b5fd34810aae3c3dba8756753e0bc08407ef7b5067d3c
-
Size
7.7MB
-
Sample
250415-e3qj7astav
-
MD5
c2b4edb861ee75baaa94dcfdb56f49e6
-
SHA1
c86e3504135e4d1833a0f62ae68d38d1250d543f
-
SHA256
ad1dab79b1ec0e8a060b5fd34810aae3c3dba8756753e0bc08407ef7b5067d3c
-
SHA512
c05c3fae689a8214ad15debe0b09d9298d2cfd1a0535d8f75508e730f6264da6ecf1df74372756616bc00b4f2a8549c1ac9ed8a06763413154da94d807dba914
-
SSDEEP
98304:Fws2ANnKXOaeOgmhpqItNRCNldpu0KUGPAV:vKXbeO7PqIJCPuNRPAV
Static task
static1
Malware Config
Targets
-
-
Target
ad1dab79b1ec0e8a060b5fd34810aae3c3dba8756753e0bc08407ef7b5067d3c
-
Size
7.7MB
-
MD5
c2b4edb861ee75baaa94dcfdb56f49e6
-
SHA1
c86e3504135e4d1833a0f62ae68d38d1250d543f
-
SHA256
ad1dab79b1ec0e8a060b5fd34810aae3c3dba8756753e0bc08407ef7b5067d3c
-
SHA512
c05c3fae689a8214ad15debe0b09d9298d2cfd1a0535d8f75508e730f6264da6ecf1df74372756616bc00b4f2a8549c1ac9ed8a06763413154da94d807dba914
-
SSDEEP
98304:Fws2ANnKXOaeOgmhpqItNRCNldpu0KUGPAV:vKXbeO7PqIJCPuNRPAV
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1