General

  • Target

    6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d

  • Size

    13.1MB

  • Sample

    240625-s67jrsyelf

  • MD5

    744fb0ab1ab83fd7314ad5e3ccca4545

  • SHA1

    e371869e15d1f4d50e65276e08c0909f136f50cb

  • SHA256

    6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d

  • SHA512

    ac747b4235c22e441b7e3cd6e9ea1e102695ef104fd0c6f954cef53d83c91c4ec2f03c5134e8c2de63c16d7efa6ab01fb6057e3735f85c4a866b7c65bd70c23d

  • SSDEEP

    393216:97kL8IGXGtMB5ONO+Rw6Ppx9bxN0XdIMOgC:JkAQGvOk36PpudIMHC

Malware Config

Targets

    • Target

      6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d

    • Size

      13.1MB

    • MD5

      744fb0ab1ab83fd7314ad5e3ccca4545

    • SHA1

      e371869e15d1f4d50e65276e08c0909f136f50cb

    • SHA256

      6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d

    • SHA512

      ac747b4235c22e441b7e3cd6e9ea1e102695ef104fd0c6f954cef53d83c91c4ec2f03c5134e8c2de63c16d7efa6ab01fb6057e3735f85c4a866b7c65bd70c23d

    • SSDEEP

      393216:97kL8IGXGtMB5ONO+Rw6Ppx9bxN0XdIMOgC:JkAQGvOk36PpudIMHC

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks