General

  • Target

    c884d99569b786d4b6760afffb3668f47eefb36879ecfa3dd2fd6478cc940887

  • Size

    11.7MB

  • Sample

    240625-syn3fs1dnm

  • MD5

    d861fa8b7310c65a555518e3d420c118

  • SHA1

    112c602d77e3be06e13fb5f25cec53a9f2231309

  • SHA256

    c884d99569b786d4b6760afffb3668f47eefb36879ecfa3dd2fd6478cc940887

  • SHA512

    717b4c94aad992733ccdd159ac723db9a9235413a0abdb7bcb484d35ad7b244628096a414f837b40dc4a9c4d04b2fcfef9bcfc17b4f847a248e5f1f76b0b3800

  • SSDEEP

    98304:cws2ANnKXOaeOgmhWev67gEe/0EPdH/q4NS4mhln+/Pw66cXU:KKXbeO7vv67gEVeXMhn+PB6ck

Malware Config

Targets

    • Target

      c884d99569b786d4b6760afffb3668f47eefb36879ecfa3dd2fd6478cc940887

    • Size

      11.7MB

    • MD5

      d861fa8b7310c65a555518e3d420c118

    • SHA1

      112c602d77e3be06e13fb5f25cec53a9f2231309

    • SHA256

      c884d99569b786d4b6760afffb3668f47eefb36879ecfa3dd2fd6478cc940887

    • SHA512

      717b4c94aad992733ccdd159ac723db9a9235413a0abdb7bcb484d35ad7b244628096a414f837b40dc4a9c4d04b2fcfef9bcfc17b4f847a248e5f1f76b0b3800

    • SSDEEP

      98304:cws2ANnKXOaeOgmhWev67gEe/0EPdH/q4NS4mhln+/Pw66cXU:KKXbeO7vv67gEVeXMhn+PB6ck

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks