General

  • Target

    00da14f99e7791b54ed839d5af7e6770e4e460f12c16c44962afa485d7cd9517

  • Size

    2.4MB

  • Sample

    240625-tz265s1bnh

  • MD5

    23569961af2e66b738eb6ca83aa5f9b4

  • SHA1

    2ac9f2b1c6cc019086ec2d972cad53e2bcd8592b

  • SHA256

    00da14f99e7791b54ed839d5af7e6770e4e460f12c16c44962afa485d7cd9517

  • SHA512

    cdd8ab3f45398d85dc5d797f9209758506b34be2472a8ab60f391dc9aa14890800c6d53b4d8c9445a912265914ec3b4bd6b784ef31ecbd9cd610801d92e43a17

  • SSDEEP

    24576:OCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHz:OCwsbCANnKXferL7Vwe/Gg0P+WhHo/

Malware Config

Targets

    • Target

      00da14f99e7791b54ed839d5af7e6770e4e460f12c16c44962afa485d7cd9517

    • Size

      2.4MB

    • MD5

      23569961af2e66b738eb6ca83aa5f9b4

    • SHA1

      2ac9f2b1c6cc019086ec2d972cad53e2bcd8592b

    • SHA256

      00da14f99e7791b54ed839d5af7e6770e4e460f12c16c44962afa485d7cd9517

    • SHA512

      cdd8ab3f45398d85dc5d797f9209758506b34be2472a8ab60f391dc9aa14890800c6d53b4d8c9445a912265914ec3b4bd6b784ef31ecbd9cd610801d92e43a17

    • SSDEEP

      24576:OCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHz:OCwsbCANnKXferL7Vwe/Gg0P+WhHo/

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks