General

  • Target

    e03c412a386f6a9a1223fd5ad8a9042de443b8ca3de1443fa1d008c3e67d74cc

  • Size

    3.8MB

  • Sample

    240625-qh282asare

  • MD5

    4746a6359fc60b81713f0222db579e80

  • SHA1

    db78dc5a56c7e90272b7edf5fdd6854230bc7079

  • SHA256

    e03c412a386f6a9a1223fd5ad8a9042de443b8ca3de1443fa1d008c3e67d74cc

  • SHA512

    0ac727afced2055e045949c318d59f6a5add1d8d129bd5b7baf48f2e47018920b347572628d0a2a0961f52b454530ffebfa8a9d44779a673388f5062be61f92d

  • SSDEEP

    98304:Ews2ANnKXOaeOgmhk353ZDSBFB973PHBdBpvXvDTdBtB/jznPnDvDDZw:SKXbeO7Y3ZDSBFB973PHBdBpvXvDTdBq

Malware Config

Targets

    • Target

      e03c412a386f6a9a1223fd5ad8a9042de443b8ca3de1443fa1d008c3e67d74cc

    • Size

      3.8MB

    • MD5

      4746a6359fc60b81713f0222db579e80

    • SHA1

      db78dc5a56c7e90272b7edf5fdd6854230bc7079

    • SHA256

      e03c412a386f6a9a1223fd5ad8a9042de443b8ca3de1443fa1d008c3e67d74cc

    • SHA512

      0ac727afced2055e045949c318d59f6a5add1d8d129bd5b7baf48f2e47018920b347572628d0a2a0961f52b454530ffebfa8a9d44779a673388f5062be61f92d

    • SSDEEP

      98304:Ews2ANnKXOaeOgmhk353ZDSBFB973PHBdBpvXvDTdBtB/jznPnDvDDZw:SKXbeO7Y3ZDSBFB973PHBdBpvXvDTdBq

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks