General

  • Target

    1c7f436f831d5f4b12ed0e74e60d1535ec802d9812a6121a3d56ec0897f9f672

  • Size

    33KB

  • Sample

    221014-1hykysefbr

  • MD5

    4c9cef23f592a028cee6534b90801b6b

  • SHA1

    509b191b8f762bdc247096c120d09e79fae96e83

  • SHA256

    1c7f436f831d5f4b12ed0e74e60d1535ec802d9812a6121a3d56ec0897f9f672

  • SHA512

    d548b5d9aa95cdb3a1e7f732950e80e81f23b0bc79ee7103d0e46e903d860dedf8d6c660c3d8ff6b5af3f0e51a19235c2f9fbff34017c8a42dfba28f206697f4

  • SSDEEP

    384:I1rO/m6JuAa26QtdZmsmfU/eAri+DngqDUbhCD2SlAI9LiNvLp+Cw:xJu/MZmFArKqPD2S64LIlT

Malware Config

Targets

    • Target

      1c7f436f831d5f4b12ed0e74e60d1535ec802d9812a6121a3d56ec0897f9f672

    • Size

      33KB

    • MD5

      4c9cef23f592a028cee6534b90801b6b

    • SHA1

      509b191b8f762bdc247096c120d09e79fae96e83

    • SHA256

      1c7f436f831d5f4b12ed0e74e60d1535ec802d9812a6121a3d56ec0897f9f672

    • SHA512

      d548b5d9aa95cdb3a1e7f732950e80e81f23b0bc79ee7103d0e46e903d860dedf8d6c660c3d8ff6b5af3f0e51a19235c2f9fbff34017c8a42dfba28f206697f4

    • SSDEEP

      384:I1rO/m6JuAa26QtdZmsmfU/eAri+DngqDUbhCD2SlAI9LiNvLp+Cw:xJu/MZmFArKqPD2S64LIlT

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • UAC bypass

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • An obfuscated cmd.exe command-line is typically used to evade detection.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

Query Registry

4
T1012

System Information Discovery

6
T1082

Peripheral Device Discovery

2
T1120

Tasks