General

  • Target

    f16540c65e139d96a3bc2cc64a9e0bafc738566cb8726cc9e507199feaaf5b05

  • Size

    4.5MB

  • Sample

    240526-hdan8aab2v

  • MD5

    31b3ed18e56d7817bfc096a9da99a15c

  • SHA1

    0e559ae21a1c3908756e1307063a085d731dbe34

  • SHA256

    f16540c65e139d96a3bc2cc64a9e0bafc738566cb8726cc9e507199feaaf5b05

  • SHA512

    b4149afc2d82892dfa4986f11ec7591669f4e797c7e3c84b24bd86648914acb02e0197b7ec1fd24672a035fb9310b1540f139fdce28efc6d9e7d86458c6f2d53

  • SSDEEP

    49152:009XJt4HIN2H2tFvduySBbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8b8R:ZZJt4HINy2LkBbXsPN5kiQaZ56

Malware Config

Targets

    • Target

      f16540c65e139d96a3bc2cc64a9e0bafc738566cb8726cc9e507199feaaf5b05

    • Size

      4.5MB

    • MD5

      31b3ed18e56d7817bfc096a9da99a15c

    • SHA1

      0e559ae21a1c3908756e1307063a085d731dbe34

    • SHA256

      f16540c65e139d96a3bc2cc64a9e0bafc738566cb8726cc9e507199feaaf5b05

    • SHA512

      b4149afc2d82892dfa4986f11ec7591669f4e797c7e3c84b24bd86648914acb02e0197b7ec1fd24672a035fb9310b1540f139fdce28efc6d9e7d86458c6f2d53

    • SSDEEP

      49152:009XJt4HIN2H2tFvduySBbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8b8R:ZZJt4HINy2LkBbXsPN5kiQaZ56

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks