General

  • Target

    050d922ddefbb64dfe1493f7ca7a6fab3aac8c6e71b7da4eb656535822292403

  • Size

    2.3MB

  • Sample

    230207-ppalxsbf63

  • MD5

    da86020dfe6864f4d1cd5d9cca81b07e

  • SHA1

    fc063a1e268fc3ecf064b6acf727d9dad2036ac6

  • SHA256

    050d922ddefbb64dfe1493f7ca7a6fab3aac8c6e71b7da4eb656535822292403

  • SHA512

    5efd33e7efd467dd452b07b7372bbdb4099b7214fa964e5a6f8acab51303d72fb61b41b2b0e7dc3a86069a641b7903fd96086298c3dc0096ea3b57474821ac25

  • SSDEEP

    49152:0dITtmhdLLX4+K7AFc6eUbJ8HeNnENfpFMPGO42djTHVGabM1:0dWtmhd3IlgcC2HeaNfp+uOfjTK1

Malware Config

Targets

    • Target

      050d922ddefbb64dfe1493f7ca7a6fab3aac8c6e71b7da4eb656535822292403

    • Size

      2.3MB

    • MD5

      da86020dfe6864f4d1cd5d9cca81b07e

    • SHA1

      fc063a1e268fc3ecf064b6acf727d9dad2036ac6

    • SHA256

      050d922ddefbb64dfe1493f7ca7a6fab3aac8c6e71b7da4eb656535822292403

    • SHA512

      5efd33e7efd467dd452b07b7372bbdb4099b7214fa964e5a6f8acab51303d72fb61b41b2b0e7dc3a86069a641b7903fd96086298c3dc0096ea3b57474821ac25

    • SSDEEP

      49152:0dITtmhdLLX4+K7AFc6eUbJ8HeNnENfpFMPGO42djTHVGabM1:0dWtmhd3IlgcC2HeaNfp+uOfjTK1

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks