General

  • Target

    3bc8aa09d7a729bb01b5c25a56426192dfd0d3f6fdb430d7a9f4ef8945020092

  • Size

    2.7MB

  • Sample

    240526-hg5c1abb92

  • MD5

    b4fcb74ffa1b3669257ff856ce9032c8

  • SHA1

    844d882c4a28e4246202cbe993a2aba9fecf616c

  • SHA256

    3bc8aa09d7a729bb01b5c25a56426192dfd0d3f6fdb430d7a9f4ef8945020092

  • SHA512

    9d580f532a5e43085dbed6213762e83fadf596a82a40284eab5ee504c3012d0dff7e933829ab82f20613b2d021f7572c58f50aa868e353147108bea695e27ddd

  • SSDEEP

    49152:9CwsbCANnKXferL7Vwe/Gg0P+WhSQDmn22:Aws2ANnKXOaeOgmhZDmn22

Malware Config

Targets

    • Target

      3bc8aa09d7a729bb01b5c25a56426192dfd0d3f6fdb430d7a9f4ef8945020092

    • Size

      2.7MB

    • MD5

      b4fcb74ffa1b3669257ff856ce9032c8

    • SHA1

      844d882c4a28e4246202cbe993a2aba9fecf616c

    • SHA256

      3bc8aa09d7a729bb01b5c25a56426192dfd0d3f6fdb430d7a9f4ef8945020092

    • SHA512

      9d580f532a5e43085dbed6213762e83fadf596a82a40284eab5ee504c3012d0dff7e933829ab82f20613b2d021f7572c58f50aa868e353147108bea695e27ddd

    • SSDEEP

      49152:9CwsbCANnKXferL7Vwe/Gg0P+WhSQDmn22:Aws2ANnKXOaeOgmhZDmn22

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks