General

  • Target

    e59e5e2b2bb13676ff8d18d76ca4187d5297b156895bbce3d41f69d3e6004865

  • Size

    2.7MB

  • Sample

    240626-abeldssajc

  • MD5

    394e9609240e14983aea3af674e7b1ee

  • SHA1

    ecc2c25c438ee8d9727e40d8b5b440fe6c4f93dd

  • SHA256

    e59e5e2b2bb13676ff8d18d76ca4187d5297b156895bbce3d41f69d3e6004865

  • SHA512

    c6848274b0c5e7356ea6e63b6d985c21ed622e440e7110a1c31578ae9001566f908577e8c9321af1ef851ebc1700ad7611f4133a717de774688f889463afe721

  • SSDEEP

    49152:zQZAdVyVT9n/Gg0P+Whoz7wn+cG5evZbwaIjG5F:0GdVyVT9nOgmhmw+gZ5IjGD

Malware Config

Targets

    • Target

      e59e5e2b2bb13676ff8d18d76ca4187d5297b156895bbce3d41f69d3e6004865

    • Size

      2.7MB

    • MD5

      394e9609240e14983aea3af674e7b1ee

    • SHA1

      ecc2c25c438ee8d9727e40d8b5b440fe6c4f93dd

    • SHA256

      e59e5e2b2bb13676ff8d18d76ca4187d5297b156895bbce3d41f69d3e6004865

    • SHA512

      c6848274b0c5e7356ea6e63b6d985c21ed622e440e7110a1c31578ae9001566f908577e8c9321af1ef851ebc1700ad7611f4133a717de774688f889463afe721

    • SSDEEP

      49152:zQZAdVyVT9n/Gg0P+Whoz7wn+cG5evZbwaIjG5F:0GdVyVT9nOgmhmw+gZ5IjGD

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks