General

  • Target

    079800af9531198fc6a99cfb2a856b23cb3a9044a559c5704c2e29a02f6cf0c5

  • Size

    5.9MB

  • Sample

    240529-cz7cesfa5x

  • MD5

    18ce35fd88a00db80529c6e44d836772

  • SHA1

    f80cfb19375b368a7aadfbb030fd0713cf099bd2

  • SHA256

    079800af9531198fc6a99cfb2a856b23cb3a9044a559c5704c2e29a02f6cf0c5

  • SHA512

    194618a5b7eab0fc26b9d39b20441fa0ecc97a77c621deacb42e5d62c4a518d138d66dc6db6bc3c03fc9b31879587f11fd9373fef655da330724cd5316420026

  • SSDEEP

    98304:oGdVyVT9nOgmhhJDmn2a2KP8Q6XLd+Wo7BKgZMQIY26cak2Ohkgkt:vWT9nO7bFmnfrP8Q6Xc7xIYH628VC

Malware Config

Targets

    • Target

      079800af9531198fc6a99cfb2a856b23cb3a9044a559c5704c2e29a02f6cf0c5

    • Size

      5.9MB

    • MD5

      18ce35fd88a00db80529c6e44d836772

    • SHA1

      f80cfb19375b368a7aadfbb030fd0713cf099bd2

    • SHA256

      079800af9531198fc6a99cfb2a856b23cb3a9044a559c5704c2e29a02f6cf0c5

    • SHA512

      194618a5b7eab0fc26b9d39b20441fa0ecc97a77c621deacb42e5d62c4a518d138d66dc6db6bc3c03fc9b31879587f11fd9373fef655da330724cd5316420026

    • SSDEEP

      98304:oGdVyVT9nOgmhhJDmn2a2KP8Q6XLd+Wo7BKgZMQIY26cak2Ohkgkt:vWT9nO7bFmnfrP8Q6Xc7xIYH628VC

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks