General

  • Target

    515b7157f03135ea13d49ebf3dc2389ba6bc5f8c10fc9e2be13a44eabc9c3058

  • Size

    4.6MB

  • Sample

    231023-kjyz4sfb5v

  • MD5

    2f7d0a54eafa54d04b270abf329cbd0e

  • SHA1

    7f5dc29e23e299688b88f0b04b54a0485a105d6e

  • SHA256

    515b7157f03135ea13d49ebf3dc2389ba6bc5f8c10fc9e2be13a44eabc9c3058

  • SHA512

    1f6561968dd353c6579c2855b73c43910c0c765f665dfe49986a93b7654c5177eda4f87249b14b1765ee7895dfbe852d0d1fd9bfb08d54b00a5a590c0e082c61

  • SSDEEP

    49152:PCwsbCANnKXferL7Vwe/Gg0P+WhZWRnXgsxlY2wTJfV/jhnxWT:aws2ANnKXOaeOgmhZYnwwlY2wld7Py

Malware Config

Targets

    • Target

      515b7157f03135ea13d49ebf3dc2389ba6bc5f8c10fc9e2be13a44eabc9c3058

    • Size

      4.6MB

    • MD5

      2f7d0a54eafa54d04b270abf329cbd0e

    • SHA1

      7f5dc29e23e299688b88f0b04b54a0485a105d6e

    • SHA256

      515b7157f03135ea13d49ebf3dc2389ba6bc5f8c10fc9e2be13a44eabc9c3058

    • SHA512

      1f6561968dd353c6579c2855b73c43910c0c765f665dfe49986a93b7654c5177eda4f87249b14b1765ee7895dfbe852d0d1fd9bfb08d54b00a5a590c0e082c61

    • SSDEEP

      49152:PCwsbCANnKXferL7Vwe/Gg0P+WhZWRnXgsxlY2wTJfV/jhnxWT:aws2ANnKXOaeOgmhZYnwwlY2wld7Py

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks