General

  • Target

    9aacc74a8d672265b76639c3781aecf9734b5d553a00e753a27ae81e815db1b6

  • Size

    2.8MB

  • Sample

    240526-f46s8sge4z

  • MD5

    ad8c6205ae8eb55473dae145a07345d5

  • SHA1

    40f46bb0d413e35eb4250f8d1188a18650b1b3a3

  • SHA256

    9aacc74a8d672265b76639c3781aecf9734b5d553a00e753a27ae81e815db1b6

  • SHA512

    277dba72032349ebae47f55ace80b1c99cedd6f011cb121cc082114dd05b6099105fb86d5c1579b9c400ebe17b080cb236c20a020a76d767e33adc529ebc6066

  • SSDEEP

    49152:3CwsbCANnKXferL7Vwe/Gg0P+WheZs2yyzAWLN3pqsakuWndd7MRCMSfmQRWfHjd:yws2ANnKXOaeOgmhrUERz

Malware Config

Targets

    • Target

      9aacc74a8d672265b76639c3781aecf9734b5d553a00e753a27ae81e815db1b6

    • Size

      2.8MB

    • MD5

      ad8c6205ae8eb55473dae145a07345d5

    • SHA1

      40f46bb0d413e35eb4250f8d1188a18650b1b3a3

    • SHA256

      9aacc74a8d672265b76639c3781aecf9734b5d553a00e753a27ae81e815db1b6

    • SHA512

      277dba72032349ebae47f55ace80b1c99cedd6f011cb121cc082114dd05b6099105fb86d5c1579b9c400ebe17b080cb236c20a020a76d767e33adc529ebc6066

    • SSDEEP

      49152:3CwsbCANnKXferL7Vwe/Gg0P+WheZs2yyzAWLN3pqsakuWndd7MRCMSfmQRWfHjd:yws2ANnKXOaeOgmhrUERz

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks