General
-
Target
538d321fa6e0fae3d2e7b1a41834208f55e3f81572f8e26058f52d665c87bbb6
-
Size
1.4MB
-
Sample
250422-v9mpwawqx9
-
MD5
bf6bbdc60d441d65ab49df5b236e53a7
-
SHA1
42648a5a921e3374ba762e2c8da78bdf9a65a250
-
SHA256
538d321fa6e0fae3d2e7b1a41834208f55e3f81572f8e26058f52d665c87bbb6
-
SHA512
5b25139ef1ea73a0205b8d5f2505f0b6cdf51b486db09700b793be46b112aa3d57ef6d990a0cfe472905a55763f2c7ff34648fe4c90576ad190eb00cf6ace6b0
-
SSDEEP
24576:F39WaOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:598HPkVOBTK
Static task
static1
Behavioral task
behavioral1
Sample
538d321fa6e0fae3d2e7b1a41834208f55e3f81572f8e26058f52d665c87bbb6.exe
Resource
win10v2004-20250410-en
Malware Config
Targets
-
-
Target
538d321fa6e0fae3d2e7b1a41834208f55e3f81572f8e26058f52d665c87bbb6
-
Size
1.4MB
-
MD5
bf6bbdc60d441d65ab49df5b236e53a7
-
SHA1
42648a5a921e3374ba762e2c8da78bdf9a65a250
-
SHA256
538d321fa6e0fae3d2e7b1a41834208f55e3f81572f8e26058f52d665c87bbb6
-
SHA512
5b25139ef1ea73a0205b8d5f2505f0b6cdf51b486db09700b793be46b112aa3d57ef6d990a0cfe472905a55763f2c7ff34648fe4c90576ad190eb00cf6ace6b0
-
SSDEEP
24576:F39WaOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:598HPkVOBTK
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v16
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1