General

  • Target

    2e6f31317da7037f4e62d6f744fb53ac7c9b991b2c75e92c1d089372e3e65dd5

  • Size

    1.3MB

  • Sample

    240228-zejrysdb8v

  • MD5

    fb962578b25c167d6973ae3ee20f1eb4

  • SHA1

    48fe13b50952ad4bc8208fe89772923770f0f846

  • SHA256

    2e6f31317da7037f4e62d6f744fb53ac7c9b991b2c75e92c1d089372e3e65dd5

  • SHA512

    59a39be5277840aa36f5bbf380f16045b995baa720d4a9c569fdf2a26e77f78058b9ea5396dc0b4d8f532b8dfbbf094d675f696f5b3a1f4a86347f7099474e55

  • SSDEEP

    24576:cQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVAGLLB:cQZAdVyVT9n/Gg0P+WhoMB

Malware Config

Targets

    • Target

      2e6f31317da7037f4e62d6f744fb53ac7c9b991b2c75e92c1d089372e3e65dd5

    • Size

      1.3MB

    • MD5

      fb962578b25c167d6973ae3ee20f1eb4

    • SHA1

      48fe13b50952ad4bc8208fe89772923770f0f846

    • SHA256

      2e6f31317da7037f4e62d6f744fb53ac7c9b991b2c75e92c1d089372e3e65dd5

    • SHA512

      59a39be5277840aa36f5bbf380f16045b995baa720d4a9c569fdf2a26e77f78058b9ea5396dc0b4d8f532b8dfbbf094d675f696f5b3a1f4a86347f7099474e55

    • SSDEEP

      24576:cQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVAGLLB:cQZAdVyVT9n/Gg0P+WhoMB

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks