General

  • Target

    ddbc5361cf9253ccc46b27f61938d0353843eed26d48d2bb9d8b6e6fb08c063f

  • Size

    11.9MB

  • Sample

    240625-1myfravgke

  • MD5

    f0a1bcd34f78561f0afe5316f2f9dcea

  • SHA1

    9ec5b27685133c78319361c78c2384ad4c2264ce

  • SHA256

    ddbc5361cf9253ccc46b27f61938d0353843eed26d48d2bb9d8b6e6fb08c063f

  • SHA512

    4cf5eab548e510f83883cbe6efb19435a07ae0ce15d4d860f816cfc7cd33d3151f81e2b10b8277d8b1ea2dc2cfecff9a72a2c1158a67a6ed8c99ba29a3655c1f

  • SSDEEP

    196608:BKXbeO7fzLHgQi5PeT8LGtPUsFoDMrM7EXJ+8UtaIGbtfgXo/1fu:S7fz0GQLGHw2DUtaX84Bu

Malware Config

Targets

    • Target

      ddbc5361cf9253ccc46b27f61938d0353843eed26d48d2bb9d8b6e6fb08c063f

    • Size

      11.9MB

    • MD5

      f0a1bcd34f78561f0afe5316f2f9dcea

    • SHA1

      9ec5b27685133c78319361c78c2384ad4c2264ce

    • SHA256

      ddbc5361cf9253ccc46b27f61938d0353843eed26d48d2bb9d8b6e6fb08c063f

    • SHA512

      4cf5eab548e510f83883cbe6efb19435a07ae0ce15d4d860f816cfc7cd33d3151f81e2b10b8277d8b1ea2dc2cfecff9a72a2c1158a67a6ed8c99ba29a3655c1f

    • SSDEEP

      196608:BKXbeO7fzLHgQi5PeT8LGtPUsFoDMrM7EXJ+8UtaIGbtfgXo/1fu:S7fz0GQLGHw2DUtaX84Bu

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks