General

  • Target

    afd334575c1b3a197ab6c4f822a76c85759f7ca98ca68887e4ca64e3f59b3f66

  • Size

    4.3MB

  • Sample

    230815-gcpw3sba6s

  • MD5

    a775ef34cb1060835f0cd1eddc271973

  • SHA1

    00f0f5ba5a0db610ab5dff2a1a78ce6e391d62d6

  • SHA256

    afd334575c1b3a197ab6c4f822a76c85759f7ca98ca68887e4ca64e3f59b3f66

  • SHA512

    651ed35f190a31efdaf782bf264684a3be2a4f4ec94f6183ae3d1bcf86131f2b0969bafbc48a0d2eca2146e759a50d81af2bd7af9cdad28f5f3c444ddbf3efff

  • SSDEEP

    98304:RZwM9FNQgb13VUMy7IHVXlyiiCW7E92siviZVmqt5sMo2:RZRF/tx3oEq8My5B

Malware Config

Targets

    • Target

      afd334575c1b3a197ab6c4f822a76c85759f7ca98ca68887e4ca64e3f59b3f66

    • Size

      4.3MB

    • MD5

      a775ef34cb1060835f0cd1eddc271973

    • SHA1

      00f0f5ba5a0db610ab5dff2a1a78ce6e391d62d6

    • SHA256

      afd334575c1b3a197ab6c4f822a76c85759f7ca98ca68887e4ca64e3f59b3f66

    • SHA512

      651ed35f190a31efdaf782bf264684a3be2a4f4ec94f6183ae3d1bcf86131f2b0969bafbc48a0d2eca2146e759a50d81af2bd7af9cdad28f5f3c444ddbf3efff

    • SSDEEP

      98304:RZwM9FNQgb13VUMy7IHVXlyiiCW7E92siviZVmqt5sMo2:RZRF/tx3oEq8My5B

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks