General

  • Target

    19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb

  • Size

    2.7MB

  • Sample

    240109-nswswsgger

  • MD5

    3ad1c9b351cf402836e4512afeb56a71

  • SHA1

    5001db6ea8468270101dd2c2c87bcbe678bade47

  • SHA256

    19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb

  • SHA512

    652855f9543c13120d43e5739d262baaddcb0ca82ea15001e3ac49849baddd3ac46a10783d71815f0ae3220ff804ee472623e9a78a4af4932e3577180a684315

  • SSDEEP

    24576:QCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHJ:QCwsbCANnKXferL7Vwe/Gg0P+Whm1gMl

Malware Config

Targets

    • Target

      19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb

    • Size

      2.7MB

    • MD5

      3ad1c9b351cf402836e4512afeb56a71

    • SHA1

      5001db6ea8468270101dd2c2c87bcbe678bade47

    • SHA256

      19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb

    • SHA512

      652855f9543c13120d43e5739d262baaddcb0ca82ea15001e3ac49849baddd3ac46a10783d71815f0ae3220ff804ee472623e9a78a4af4932e3577180a684315

    • SSDEEP

      24576:QCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHJ:QCwsbCANnKXferL7Vwe/Gg0P+Whm1gMl

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks