General

  • Target

    tmp

  • Size

    720KB

  • Sample

    230408-mnp9wach82

  • MD5

    360a77d93eabf70e75735e3e42378a4d

  • SHA1

    10b32d41b442352be8f4e8bc852dced9ebfdc6c8

  • SHA256

    0cd5ba847ee4e7966429e8f2e746bea07b0812db06bd02d262b1b0046e5a32d6

  • SHA512

    56f08de22e1c012660c2f839c527f37235d34f7be6af5cf0944ee11ab1eb96fdb2882cb3040b119ca31e71c9d63390747982432c5fa4781b2b61e41072efd4cc

  • SSDEEP

    12288:AEj95N5zSmai5m7cRIOTrOtjpwdoy3CgByyy/0zjwveiE86rc0SaSEm7J:tx5Non7cRIUOzyPIyycjw2iE8v0SavEJ

Malware Config

Extracted

Family

gh0strat

C2

45.207.11.105

Targets

    • Target

      tmp

    • Size

      720KB

    • MD5

      360a77d93eabf70e75735e3e42378a4d

    • SHA1

      10b32d41b442352be8f4e8bc852dced9ebfdc6c8

    • SHA256

      0cd5ba847ee4e7966429e8f2e746bea07b0812db06bd02d262b1b0046e5a32d6

    • SHA512

      56f08de22e1c012660c2f839c527f37235d34f7be6af5cf0944ee11ab1eb96fdb2882cb3040b119ca31e71c9d63390747982432c5fa4781b2b61e41072efd4cc

    • SSDEEP

      12288:AEj95N5zSmai5m7cRIOTrOtjpwdoy3CgByyy/0zjwveiE86rc0SaSEm7J:tx5Non7cRIUOzyPIyycjw2iE8v0SavEJ

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks