General

  • Target

    5174c768aea84004df2dab6cb5750c0beead9822dc522be392b91226760bc2c3

  • Size

    5.0MB

  • Sample

    240626-ahyb3svemr

  • MD5

    c0a00ad4fae6c54ff13bceedd8148fd4

  • SHA1

    aede84bec5b924df56c333e7c1150ddf1569af1d

  • SHA256

    5174c768aea84004df2dab6cb5750c0beead9822dc522be392b91226760bc2c3

  • SHA512

    6515304afe35ae7557dbc55cac3f4c84360de9c0e4e6ac9ebd984e6b7f6c7a9787deb2ad45dbf8eb5c6bd72fccc516654de9b92b8a9c8e16f185f94154e857ab

  • SSDEEP

    98304:rGdVyVT9nOgmhraZiYoG6yn2fDo4E9yUqp36iYJGD:YWT9nO71aQHyncZYqp3yo

Malware Config

Targets

    • Target

      5174c768aea84004df2dab6cb5750c0beead9822dc522be392b91226760bc2c3

    • Size

      5.0MB

    • MD5

      c0a00ad4fae6c54ff13bceedd8148fd4

    • SHA1

      aede84bec5b924df56c333e7c1150ddf1569af1d

    • SHA256

      5174c768aea84004df2dab6cb5750c0beead9822dc522be392b91226760bc2c3

    • SHA512

      6515304afe35ae7557dbc55cac3f4c84360de9c0e4e6ac9ebd984e6b7f6c7a9787deb2ad45dbf8eb5c6bd72fccc516654de9b92b8a9c8e16f185f94154e857ab

    • SSDEEP

      98304:rGdVyVT9nOgmhraZiYoG6yn2fDo4E9yUqp36iYJGD:YWT9nO71aQHyncZYqp3yo

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks