General

  • Target

    e9c5fa9049aaa8802f1d9c2913c92d50a4b9cf3f5c44e22412079db10c747967

  • Size

    2.3MB

  • Sample

    240526-qbxd7sfa8z

  • MD5

    04b701644ddcc4ff48eeebbc4997d82d

  • SHA1

    bf26c8e0b9f9cd0b21cbbcbbecd76929cce29bfc

  • SHA256

    e9c5fa9049aaa8802f1d9c2913c92d50a4b9cf3f5c44e22412079db10c747967

  • SHA512

    35fd3be897a5a1a578c9029c98380da13487a2ebc786fae0636999ce90f1355b0c9b95a17f65bf5f6eea14680860705492d2563fc8b3eb4a3687bb7d3c90f1aa

  • SSDEEP

    24576:fCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHc:fCwsbCANnKXferL7Vwe/Gg0P+WhT

Malware Config

Targets

    • Target

      e9c5fa9049aaa8802f1d9c2913c92d50a4b9cf3f5c44e22412079db10c747967

    • Size

      2.3MB

    • MD5

      04b701644ddcc4ff48eeebbc4997d82d

    • SHA1

      bf26c8e0b9f9cd0b21cbbcbbecd76929cce29bfc

    • SHA256

      e9c5fa9049aaa8802f1d9c2913c92d50a4b9cf3f5c44e22412079db10c747967

    • SHA512

      35fd3be897a5a1a578c9029c98380da13487a2ebc786fae0636999ce90f1355b0c9b95a17f65bf5f6eea14680860705492d2563fc8b3eb4a3687bb7d3c90f1aa

    • SSDEEP

      24576:fCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHc:fCwsbCANnKXferL7Vwe/Gg0P+WhT

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks