General
-
Target
810dc03249954a98306b8a237050de5aed239f45f27bfc720454f37e44ef7208
-
Size
3.6MB
-
Sample
250415-ez486sxq14
-
MD5
5c2fa3c5ef6d5069a256abc9d0ab1d2e
-
SHA1
06730823a58d1b2ad81b7e3fc89677dd1982ab42
-
SHA256
810dc03249954a98306b8a237050de5aed239f45f27bfc720454f37e44ef7208
-
SHA512
17008917c6f75d4326c6759b0a9869d01dad3fd99e7c798ab65d1ee0f5b6827f20bb346e727a72976da143b25e87a218135a8347c002ee841a9afe50d1481da3
-
SSDEEP
49152:CCwsbCANnKXferL7Vwe/Gg0P+WhpS8oIK+izmHMTT:Fws2ANnKXOaeOgmhpqIts
Static task
static1
Malware Config
Targets
-
-
Target
810dc03249954a98306b8a237050de5aed239f45f27bfc720454f37e44ef7208
-
Size
3.6MB
-
MD5
5c2fa3c5ef6d5069a256abc9d0ab1d2e
-
SHA1
06730823a58d1b2ad81b7e3fc89677dd1982ab42
-
SHA256
810dc03249954a98306b8a237050de5aed239f45f27bfc720454f37e44ef7208
-
SHA512
17008917c6f75d4326c6759b0a9869d01dad3fd99e7c798ab65d1ee0f5b6827f20bb346e727a72976da143b25e87a218135a8347c002ee841a9afe50d1481da3
-
SSDEEP
49152:CCwsbCANnKXferL7Vwe/Gg0P+WhpS8oIK+izmHMTT:Fws2ANnKXOaeOgmhpqIts
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1