General

  • Target

    ac8bd683789d6db878e85696e43346bc92d468e4524a1aa0ae319975d6dd2c72

  • Size

    8.5MB

  • Sample

    240526-fxmrsagc3y

  • MD5

    0f67cc2e42069cb24164a7c3a2b3e9cd

  • SHA1

    686c7573dceba02a5e49327521dcb7134c809225

  • SHA256

    ac8bd683789d6db878e85696e43346bc92d468e4524a1aa0ae319975d6dd2c72

  • SHA512

    adc182784d20037b4aff44592bad44139a6bc60cd7da0e96bf456ee32f8503b708fe4dec98f65bf7037e8cc91ef595837b2ea695989618005081ad9470c25a3b

  • SSDEEP

    196608:DWT9nO7MzOJRCsU3lHOYhE0dutEcKEmmI1nzH59a3K2ZXVVoVeB:Z7EO3xatvE05EW1zH5V2ZFVoVeB

Malware Config

Targets

    • Target

      ac8bd683789d6db878e85696e43346bc92d468e4524a1aa0ae319975d6dd2c72

    • Size

      8.5MB

    • MD5

      0f67cc2e42069cb24164a7c3a2b3e9cd

    • SHA1

      686c7573dceba02a5e49327521dcb7134c809225

    • SHA256

      ac8bd683789d6db878e85696e43346bc92d468e4524a1aa0ae319975d6dd2c72

    • SHA512

      adc182784d20037b4aff44592bad44139a6bc60cd7da0e96bf456ee32f8503b708fe4dec98f65bf7037e8cc91ef595837b2ea695989618005081ad9470c25a3b

    • SSDEEP

      196608:DWT9nO7MzOJRCsU3lHOYhE0dutEcKEmmI1nzH59a3K2ZXVVoVeB:Z7EO3xatvE05EW1zH5V2ZFVoVeB

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Drops file in Drivers directory

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Privilege Escalation

Boot or Logon Autostart Execution

2
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

2
T1112

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Remote System Discovery

1
T1018

Tasks