General

  • Target

    ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef

  • Size

    6.8MB

  • Sample

    240625-qsn46awapl

  • MD5

    be07f26c587ea4ed7eb878b92d4bde44

  • SHA1

    4a1f9ed1b477b1ba5e30981df5b5066e1a4a8598

  • SHA256

    ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef

  • SHA512

    7aa742eacb7babb950cfe858563b1b32a16b95dcadb13936b9a965a66a047dc753bcc334d6e39f00a18fe51a77cd59cb7d6efda0a2f47d1e9004bc1c93f728b9

  • SSDEEP

    98304:6GdVyVT9nOgmhIvluvC6vTtIWikAa4pHPOnFR9UiYBaQQBj1OKX+JN+QriS:JWT9nO72YfTtVikUpvriV5X+JNNb

Malware Config

Targets

    • Target

      ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef

    • Size

      6.8MB

    • MD5

      be07f26c587ea4ed7eb878b92d4bde44

    • SHA1

      4a1f9ed1b477b1ba5e30981df5b5066e1a4a8598

    • SHA256

      ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef

    • SHA512

      7aa742eacb7babb950cfe858563b1b32a16b95dcadb13936b9a965a66a047dc753bcc334d6e39f00a18fe51a77cd59cb7d6efda0a2f47d1e9004bc1c93f728b9

    • SSDEEP

      98304:6GdVyVT9nOgmhIvluvC6vTtIWikAa4pHPOnFR9UiYBaQQBj1OKX+JN+QriS:JWT9nO72YfTtVikUpvriV5X+JNNb

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks