General
-
Target
d8e9cb56300afaaeadbd62d3b122b3eb9b8599ed9cbe87121f0ae12605ba305b
-
Size
2.4MB
-
Sample
250419-km5xts1wcw
-
MD5
6f887f4b8ae483d9aaa10f38b381d06b
-
SHA1
2596dcee3a634dfc7c5f44194b5a7c57e7db4fcb
-
SHA256
d8e9cb56300afaaeadbd62d3b122b3eb9b8599ed9cbe87121f0ae12605ba305b
-
SHA512
c79a3c9669657a8db050e081bb15c870a367175627fe2f34fa42c2d34fa11457d52309d52469eba1063e782ff96a660432b7e143a974daa78f3d0e9db3c67005
-
SSDEEP
24576:tCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHe:tCwsbCANnKXferL7Vwe/Gg0P+WhJbP
Static task
static1
Behavioral task
behavioral1
Sample
d8e9cb56300afaaeadbd62d3b122b3eb9b8599ed9cbe87121f0ae12605ba305b.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
d8e9cb56300afaaeadbd62d3b122b3eb9b8599ed9cbe87121f0ae12605ba305b
-
Size
2.4MB
-
MD5
6f887f4b8ae483d9aaa10f38b381d06b
-
SHA1
2596dcee3a634dfc7c5f44194b5a7c57e7db4fcb
-
SHA256
d8e9cb56300afaaeadbd62d3b122b3eb9b8599ed9cbe87121f0ae12605ba305b
-
SHA512
c79a3c9669657a8db050e081bb15c870a367175627fe2f34fa42c2d34fa11457d52309d52469eba1063e782ff96a660432b7e143a974daa78f3d0e9db3c67005
-
SSDEEP
24576:tCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHe:tCwsbCANnKXferL7Vwe/Gg0P+WhJbP
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Server Software Component: Terminal Services DLL
-
Sets service image path in registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1