General
-
Target
c6d48e829a4c81b33a94aefd4036ff1c838f0f8893e58fed1ac200c0ef935a63
-
Size
1.4MB
-
Sample
250416-v6wtdaxqw3
-
MD5
6489a3db52495a95e43b95e875b2811b
-
SHA1
3fbc47e8d65af7e06f58878f94af6cb689c55ace
-
SHA256
c6d48e829a4c81b33a94aefd4036ff1c838f0f8893e58fed1ac200c0ef935a63
-
SHA512
f84439e3d74a083bf16244cf7e71642e911599f643e36e0036c4ffbd10d22899e40a23abfc86038752bb834fa9384cb739cfd327ca71307d009b77f1bf7dd0b6
-
SSDEEP
24576:F39WaOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:598HPkVOBTK
Static task
static1
Behavioral task
behavioral1
Sample
c6d48e829a4c81b33a94aefd4036ff1c838f0f8893e58fed1ac200c0ef935a63.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
c6d48e829a4c81b33a94aefd4036ff1c838f0f8893e58fed1ac200c0ef935a63
-
Size
1.4MB
-
MD5
6489a3db52495a95e43b95e875b2811b
-
SHA1
3fbc47e8d65af7e06f58878f94af6cb689c55ace
-
SHA256
c6d48e829a4c81b33a94aefd4036ff1c838f0f8893e58fed1ac200c0ef935a63
-
SHA512
f84439e3d74a083bf16244cf7e71642e911599f643e36e0036c4ffbd10d22899e40a23abfc86038752bb834fa9384cb739cfd327ca71307d009b77f1bf7dd0b6
-
SSDEEP
24576:F39WaOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:598HPkVOBTK
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v16
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1