General

  • Target

    aa167eb195c96da88274ef97f6a70d58e275b44571a5b9aafbcd92f083380548

  • Size

    3.6MB

  • Sample

    231014-bj1dhahc2s

  • MD5

    f1026c2e549762c43889d7494eaf5953

  • SHA1

    13ab5e8a76538f2ade98c5e90d5bddb215cc7e5a

  • SHA256

    aa167eb195c96da88274ef97f6a70d58e275b44571a5b9aafbcd92f083380548

  • SHA512

    c9b505b94cf0867870ac0bf588dcbdbaae03c0a1e324bfec415111179e4f0893735fc17a2fa577cd95f0db39ce82a55030df088d9b00b7effd7a420b11a818dc

  • SSDEEP

    49152:QCwsbCANnKXferL7Vwe/Gg0P+WhLtDmn2A2Jygddtd+8megltLnhEn2Z/k:7ws2ANnKXOaeOgmhxDmn2A2ggGFltLK

Malware Config

Targets

    • Target

      aa167eb195c96da88274ef97f6a70d58e275b44571a5b9aafbcd92f083380548

    • Size

      3.6MB

    • MD5

      f1026c2e549762c43889d7494eaf5953

    • SHA1

      13ab5e8a76538f2ade98c5e90d5bddb215cc7e5a

    • SHA256

      aa167eb195c96da88274ef97f6a70d58e275b44571a5b9aafbcd92f083380548

    • SHA512

      c9b505b94cf0867870ac0bf588dcbdbaae03c0a1e324bfec415111179e4f0893735fc17a2fa577cd95f0db39ce82a55030df088d9b00b7effd7a420b11a818dc

    • SSDEEP

      49152:QCwsbCANnKXferL7Vwe/Gg0P+WhLtDmn2A2Jygddtd+8megltLnhEn2Z/k:7ws2ANnKXOaeOgmhxDmn2A2ggGFltLK

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks