General

  • Target

    d46dbbb40bf11bda9b1aa74d9d2550a73ab0ae6008270c2c541153cd4974a3dd.zip

  • Size

    610KB

  • Sample

    230321-ryvdssbb83

  • MD5

    7a8d94fd3aa3197094a043c56d44787e

  • SHA1

    b012c3e7f5a5585b4645172cd23e9e497e72abaa

  • SHA256

    8dc79d8a4114dc40786da9991a58093e8815acc91a2c4603583bf2d2cfee10f2

  • SHA512

    e8a1c2bfa1f2f47fba5fa4ee717062f592b7964d9ed80845b1d857fe9224382f95ae6b024b5e6dd97885c6c57ee1be0af6074ff31ea2821aa2a96b0852e054c6

  • SSDEEP

    12288:rDGhwLeHKiGX0kLMt568eXorUCDDzFVvS31KFj3xGysgeV4reNaBrwQ:rRLeZKY568QGtDzFc2xGyXkuYywQ

Malware Config

Extracted

Family

gh0strat

C2

103.143.12.157

Targets

    • Target

      d46dbbb40bf11bda9b1aa74d9d2550a73ab0ae6008270c2c541153cd4974a3dd.exe

    • Size

      621KB

    • MD5

      1a5fed7b02d73b3589cebd2394fe7ce9

    • SHA1

      3c1c9668e5595ae8034b97516bbacea5ab914666

    • SHA256

      d46dbbb40bf11bda9b1aa74d9d2550a73ab0ae6008270c2c541153cd4974a3dd

    • SHA512

      0d06238afa6c5178865a0dc55af91ee79d7d18bb21d9837eb7316c7f73f8f0d6002f1f583cb6d0b2a868223f97c31a6ca00c33aed799dcef814d77c7d96a7988

    • SSDEEP

      12288:0MDDEEuqctaY5effnWQ7x7dJsPMR1F4fWDNo5F/oJBprSqYeJGDH12AlgC9h:0MDoTqctaY5effnW8RDsXOvvYp19lgCf

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks