General

  • Target

    infected.zip

  • Size

    11.4MB

  • Sample

    230226-15l6faaf55

  • MD5

    20378da4066af3d5b0ac9f0d6879e752

  • SHA1

    b6486b33e22c02ee93d32200f2f4f4dbb2dcc08d

  • SHA256

    c7d5c2d7df032671544a0974fb292e2131b541469ef1daf9c103c1a534a8ee60

  • SHA512

    9cc56049ab71c2df9f41f9faa5b30848d33721d1911bca2190ed2a0fae4e54ff959568362a0f0769f985660cab7035816e8cebc30ae35997238b07c671510a31

  • SSDEEP

    196608:W/yaLXILj6fFsb16m9kGRii2BSe2qE3LsGqjRGPnosvg93p9N0MY/6FGD2TDY:W/fSj0ebv2G2MJqE389GPnPvgb0Mz4Z

Malware Config

Targets

    • Target

      infected.zip

    • Size

      11.4MB

    • MD5

      20378da4066af3d5b0ac9f0d6879e752

    • SHA1

      b6486b33e22c02ee93d32200f2f4f4dbb2dcc08d

    • SHA256

      c7d5c2d7df032671544a0974fb292e2131b541469ef1daf9c103c1a534a8ee60

    • SHA512

      9cc56049ab71c2df9f41f9faa5b30848d33721d1911bca2190ed2a0fae4e54ff959568362a0f0769f985660cab7035816e8cebc30ae35997238b07c671510a31

    • SSDEEP

      196608:W/yaLXILj6fFsb16m9kGRii2BSe2qE3LsGqjRGPnosvg93p9N0MY/6FGD2TDY:W/fSj0ebv2G2MJqE389GPnPvgb0Mz4Z

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Drops file in Drivers directory

    • Sets service image path in registry

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

4
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Remote System Discovery

1
T1018

Tasks