General

  • Target

    92c8447ade8d3728ec38c199279365e8a28407bf25e1edc1ea85377b6e3769af

  • Size

    2.3MB

  • Sample

    240526-jhgtrscc96

  • MD5

    372f8ffc3aedd40cd5ad1d660e6c27ce

  • SHA1

    13eef8199a9b5dada724a7a8af3cee324ae3d106

  • SHA256

    92c8447ade8d3728ec38c199279365e8a28407bf25e1edc1ea85377b6e3769af

  • SHA512

    6e5728afa7ce85f576b722f0c375e73d08eeadfcdea30db1f75956da45dee30bb7713f832aa8fa4d95458c25d68c883cb8280c27ff03a505dfe1bc9e44fad7da

  • SSDEEP

    24576:CCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHN:CCwsbCANnKXferL7Vwe/Gg0P+WhO

Malware Config

Targets

    • Target

      92c8447ade8d3728ec38c199279365e8a28407bf25e1edc1ea85377b6e3769af

    • Size

      2.3MB

    • MD5

      372f8ffc3aedd40cd5ad1d660e6c27ce

    • SHA1

      13eef8199a9b5dada724a7a8af3cee324ae3d106

    • SHA256

      92c8447ade8d3728ec38c199279365e8a28407bf25e1edc1ea85377b6e3769af

    • SHA512

      6e5728afa7ce85f576b722f0c375e73d08eeadfcdea30db1f75956da45dee30bb7713f832aa8fa4d95458c25d68c883cb8280c27ff03a505dfe1bc9e44fad7da

    • SSDEEP

      24576:CCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHN:CCwsbCANnKXferL7Vwe/Gg0P+WhO

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks