General

  • Target

    aad5d78715baf3a4c7145fda146df364.bin

  • Size

    14.5MB

  • Sample

    240105-dwyfsahabn

  • MD5

    236d1ba05eda9b77064a05388c7d5d29

  • SHA1

    841e9c17beb6dfb2a05e05bd1ae7b4408f819fae

  • SHA256

    e540b21c9ac7f3e7a33d259b3e5464faf9f5e9e1e32968645ab959b4155a2fe0

  • SHA512

    04341f7f3d7bacba7fbeed3662d68001ef87bf386fb779250ce74c6d21ad57a68b55141f1c5f3ff736402951372f6cf8f8af3857ab0f333a103656d87b1901db

  • SSDEEP

    393216:VTcG0UiMKqsGyjrYqUVS2apX1hGBeQM9Pie:VIhJlxHj99t1MdMtV

Malware Config

Extracted

Family

gh0strat

C2

hfs666.top

Targets

    • Target

      d4f7142b56e0f4f2134a9d446390397d7aa79691b947e76475b776f0ae97e861.exe

    • Size

      15.5MB

    • MD5

      aad5d78715baf3a4c7145fda146df364

    • SHA1

      f7202adb66427a1616db3ec76adf285e2e81e8ac

    • SHA256

      d4f7142b56e0f4f2134a9d446390397d7aa79691b947e76475b776f0ae97e861

    • SHA512

      f079afbe44264bc349fb90f19140f03cbe70da97c535a0a04c09c69e38cd0ee330f7e331aa7995c188fdfaefb2c44488dfe61dc639fbf6587c5cb87e882a4b5c

    • SSDEEP

      196608:1cj2VCjP3Gx0GaN+hn0u50iIoysG+Xcni0iYvr00E5GqJd5igOcSWUOMzn0O1kot:ZmGxrz0utIoLv520IiBOcSWUOMr0Klzf

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks