Resubmissions

23-05-2024 17:40

240523-v83ppsag5v 10

23-05-2024 17:36

240523-v6yyqsag25 10

General

  • Target

    3e4c36cba30c92d503b1fe321ecb01f6258b7e2c80c728ec67219a88ece70dc9

  • Size

    2.4MB

  • Sample

    240523-v83ppsag5v

  • MD5

    2d7c46fb17ad8aa63394bb8c813b493d

  • SHA1

    d954075ae6942c44ac05cb14d7f63ef25d2a9425

  • SHA256

    3e4c36cba30c92d503b1fe321ecb01f6258b7e2c80c728ec67219a88ece70dc9

  • SHA512

    516def317eb8a25b013b9d6ac3d0e302da0bb553f1a3d192e1e9c492fbbb53f0a3a76cf3f2991cb84f63d8e2351a1c05337ad56db4b8be9f55d0b130e157c39f

  • SSDEEP

    24576:NCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHW:NCwsbCANnKXferL7Vwe/Gg0P+Wh9si

Malware Config

Targets

    • Target

      3e4c36cba30c92d503b1fe321ecb01f6258b7e2c80c728ec67219a88ece70dc9

    • Size

      2.4MB

    • MD5

      2d7c46fb17ad8aa63394bb8c813b493d

    • SHA1

      d954075ae6942c44ac05cb14d7f63ef25d2a9425

    • SHA256

      3e4c36cba30c92d503b1fe321ecb01f6258b7e2c80c728ec67219a88ece70dc9

    • SHA512

      516def317eb8a25b013b9d6ac3d0e302da0bb553f1a3d192e1e9c492fbbb53f0a3a76cf3f2991cb84f63d8e2351a1c05337ad56db4b8be9f55d0b130e157c39f

    • SSDEEP

      24576:NCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHW:NCwsbCANnKXferL7Vwe/Gg0P+Wh9si

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks