General

  • Target

    bd021ac9d6e2e5c53247dda5e0e581906db51d6df416dfa8f6f4e29caaccd958

  • Size

    2.7MB

  • Sample

    240625-s2hpva1eqn

  • MD5

    570bdbb21285628bb461f024dccaff89

  • SHA1

    eac62a924e2b9d8d1c39da581d848235fad16aef

  • SHA256

    bd021ac9d6e2e5c53247dda5e0e581906db51d6df416dfa8f6f4e29caaccd958

  • SHA512

    5ba6ae764659ec64048043d6594f2f2deb805405cc49a0e208a60f0f2346a4f650d6d8e12c17e70f7423da60995ae822f3b458a4f788cce6da23942217b1a796

  • SSDEEP

    49152:BQZAdVyVT9n/Gg0P+WhoBX7tjrlkWNE3LOEpFRMwXp0LW:iGdVyVT9nOgmhorwOEpFRpl

Malware Config

Targets

    • Target

      bd021ac9d6e2e5c53247dda5e0e581906db51d6df416dfa8f6f4e29caaccd958

    • Size

      2.7MB

    • MD5

      570bdbb21285628bb461f024dccaff89

    • SHA1

      eac62a924e2b9d8d1c39da581d848235fad16aef

    • SHA256

      bd021ac9d6e2e5c53247dda5e0e581906db51d6df416dfa8f6f4e29caaccd958

    • SHA512

      5ba6ae764659ec64048043d6594f2f2deb805405cc49a0e208a60f0f2346a4f650d6d8e12c17e70f7423da60995ae822f3b458a4f788cce6da23942217b1a796

    • SSDEEP

      49152:BQZAdVyVT9n/Gg0P+WhoBX7tjrlkWNE3LOEpFRMwXp0LW:iGdVyVT9nOgmhorwOEpFRpl

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks