General

  • Target

    61d17007d6a646ce0ead26e979368c9348645b9d48c04102e05e24fe99a41357

  • Size

    3.0MB

  • Sample

    230415-xsw84agg7x

  • MD5

    ce9963dbb62bfb2009a546b069454c07

  • SHA1

    5ff9b5c1d26fc1e06b52f831942c946cf8c07b4e

  • SHA256

    61d17007d6a646ce0ead26e979368c9348645b9d48c04102e05e24fe99a41357

  • SHA512

    2c34314616f4237c94f0ecd713870db27dc1af3c644f289d1b6ff9f9132042e5c6f71a474acae7558b38f0ad94e21e9702bc05162db871867e98958c6d2cf2fa

  • SSDEEP

    24576:Wm0tr+fziN56mf8t2opc7idB46Ja6+6s30WiQo0WyV1VflilAhczT6Ja6+6s30Wk:WmLnm0ti7iLmx6M8A1VflijzLx6Mk

Malware Config

Extracted

Family

gh0strat

C2

shaoshuai3.top

Targets

    • Target

      61d17007d6a646ce0ead26e979368c9348645b9d48c04102e05e24fe99a41357

    • Size

      3.0MB

    • MD5

      ce9963dbb62bfb2009a546b069454c07

    • SHA1

      5ff9b5c1d26fc1e06b52f831942c946cf8c07b4e

    • SHA256

      61d17007d6a646ce0ead26e979368c9348645b9d48c04102e05e24fe99a41357

    • SHA512

      2c34314616f4237c94f0ecd713870db27dc1af3c644f289d1b6ff9f9132042e5c6f71a474acae7558b38f0ad94e21e9702bc05162db871867e98958c6d2cf2fa

    • SSDEEP

      24576:Wm0tr+fziN56mf8t2opc7idB46Ja6+6s30WiQo0WyV1VflilAhczT6Ja6+6s30Wk:WmLnm0ti7iLmx6M8A1VflijzLx6Mk

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks