General

  • Target

    2827195b0c96802d7e7edcf5db405dc4278dc6ca45634c259cc0a3eef10fdebd

  • Size

    2.1MB

  • Sample

    240524-ntd98sfe2w

  • MD5

    b8432633911c3f42c1fc5c7877f958a3

  • SHA1

    b6e51fd89a17a71cba5eb99f71fa6e018324aaf1

  • SHA256

    2827195b0c96802d7e7edcf5db405dc4278dc6ca45634c259cc0a3eef10fdebd

  • SHA512

    ac05dd835a92d4bbb906d8424cef15a06f46c700d25733a01adec2a3b439584c15f96b79e760291a6649b90f8745be9cab315ebf4993bb4b2a9ab752394e95de

  • SSDEEP

    49152:MQZAdVyVT9n/Gg0P+WhorpebgBZPItx2apeapelI:tGdVyVT9nOgmh3EMtUvlI

Malware Config

Targets

    • Target

      2827195b0c96802d7e7edcf5db405dc4278dc6ca45634c259cc0a3eef10fdebd

    • Size

      2.1MB

    • MD5

      b8432633911c3f42c1fc5c7877f958a3

    • SHA1

      b6e51fd89a17a71cba5eb99f71fa6e018324aaf1

    • SHA256

      2827195b0c96802d7e7edcf5db405dc4278dc6ca45634c259cc0a3eef10fdebd

    • SHA512

      ac05dd835a92d4bbb906d8424cef15a06f46c700d25733a01adec2a3b439584c15f96b79e760291a6649b90f8745be9cab315ebf4993bb4b2a9ab752394e95de

    • SSDEEP

      49152:MQZAdVyVT9n/Gg0P+WhorpebgBZPItx2apeapelI:tGdVyVT9nOgmh3EMtUvlI

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks