General

  • Target

    27e621422d7a5bd1eae3c6de5f331b9c17ded935b56d4ccf6224457f34714544

  • Size

    4.8MB

  • Sample

    240524-ntkf9afe4s

  • MD5

    7c672c41261ad5cf3f534db962c05d5f

  • SHA1

    9c0899ac6388aa4b6924846700bba7ba8e8fc002

  • SHA256

    27e621422d7a5bd1eae3c6de5f331b9c17ded935b56d4ccf6224457f34714544

  • SHA512

    7bac404612c6ba8ab85e5c46e49f12c7bd38649de16fbe18c1e6234e4071e30cc111c115ec2934c9df95810f9bc74b887ee32dadb4ae5bd142707710b922f7fb

  • SSDEEP

    49152:sQZAdVyVT9n/Gg0P+WhoogTbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8w:NGdVyVT9nOgmh6TbXsPN5kiQaZ56

Malware Config

Targets

    • Target

      27e621422d7a5bd1eae3c6de5f331b9c17ded935b56d4ccf6224457f34714544

    • Size

      4.8MB

    • MD5

      7c672c41261ad5cf3f534db962c05d5f

    • SHA1

      9c0899ac6388aa4b6924846700bba7ba8e8fc002

    • SHA256

      27e621422d7a5bd1eae3c6de5f331b9c17ded935b56d4ccf6224457f34714544

    • SHA512

      7bac404612c6ba8ab85e5c46e49f12c7bd38649de16fbe18c1e6234e4071e30cc111c115ec2934c9df95810f9bc74b887ee32dadb4ae5bd142707710b922f7fb

    • SSDEEP

      49152:sQZAdVyVT9n/Gg0P+WhoogTbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8w:NGdVyVT9nOgmh6TbXsPN5kiQaZ56

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks