General
-
Target
5e3f72c31c75823ef933b8b634b8e0a05d859ae7307696f5574074b064a4a867
-
Size
3.2MB
-
Sample
250419-khrvea1te1
-
MD5
b1a06f3a1470fbc4766e1451fe761699
-
SHA1
0a5a9e5106dacd4b272be9496b6508b112674323
-
SHA256
5e3f72c31c75823ef933b8b634b8e0a05d859ae7307696f5574074b064a4a867
-
SHA512
66e12141ed188a9a3b50b884591e69fa2a52077597055f1a58a0b0be4d3b3a49a6071e3bc090a652907a9b6842f53946ae812b7a64bc31fd60b4ac1870675fb3
-
SSDEEP
49152:BCwsbCANnKXferL7Vwe/Gg0P+WhPbv3HM8lWI7eP:sws2ANnKXOaeOgmhjPJlWI7eP
Static task
static1
Behavioral task
behavioral1
Sample
5e3f72c31c75823ef933b8b634b8e0a05d859ae7307696f5574074b064a4a867.exe
Resource
win10v2004-20250410-en
Malware Config
Targets
-
-
Target
5e3f72c31c75823ef933b8b634b8e0a05d859ae7307696f5574074b064a4a867
-
Size
3.2MB
-
MD5
b1a06f3a1470fbc4766e1451fe761699
-
SHA1
0a5a9e5106dacd4b272be9496b6508b112674323
-
SHA256
5e3f72c31c75823ef933b8b634b8e0a05d859ae7307696f5574074b064a4a867
-
SHA512
66e12141ed188a9a3b50b884591e69fa2a52077597055f1a58a0b0be4d3b3a49a6071e3bc090a652907a9b6842f53946ae812b7a64bc31fd60b4ac1870675fb3
-
SSDEEP
49152:BCwsbCANnKXferL7Vwe/Gg0P+WhPbv3HM8lWI7eP:sws2ANnKXOaeOgmhjPJlWI7eP
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1