General

  • Target

    eec7c7f1d36bf3aa99a1b3a2bac5705c80d1b0f8be27d95337384844ef27d278

  • Size

    1.4MB

  • Sample

    230814-gmzh9saa38

  • MD5

    ccba0f504a67b1f68bfaf2260f35c752

  • SHA1

    0683aaa68dfc4e1c7fca95ea8823d8fb8e9f72be

  • SHA256

    eec7c7f1d36bf3aa99a1b3a2bac5705c80d1b0f8be27d95337384844ef27d278

  • SHA512

    b4fec698c999835b638dcd145cec2204959239b7bd15e71d0a1238add7d72c0fe4efb95ea1d8bfd5b4d74a0441ab7646c399e287e26795b0b8793f8441b5decf

  • SSDEEP

    24576:SQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cV1nLA5oosBBvI8:SQZAdVyVT9n/Gg0P+WhoMnLA5oosBBvl

Malware Config

Targets

    • Target

      eec7c7f1d36bf3aa99a1b3a2bac5705c80d1b0f8be27d95337384844ef27d278

    • Size

      1.4MB

    • MD5

      ccba0f504a67b1f68bfaf2260f35c752

    • SHA1

      0683aaa68dfc4e1c7fca95ea8823d8fb8e9f72be

    • SHA256

      eec7c7f1d36bf3aa99a1b3a2bac5705c80d1b0f8be27d95337384844ef27d278

    • SHA512

      b4fec698c999835b638dcd145cec2204959239b7bd15e71d0a1238add7d72c0fe4efb95ea1d8bfd5b4d74a0441ab7646c399e287e26795b0b8793f8441b5decf

    • SSDEEP

      24576:SQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cV1nLA5oosBBvI8:SQZAdVyVT9n/Gg0P+WhoMnLA5oosBBvl

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks