General

  • Target

    60f333b7195a6f96744c2da8ce32a521c9bd3e70dea54fd1f22e2823fae8d248

  • Size

    13.2MB

  • Sample

    240626-br1n8swcmc

  • MD5

    384c93cd6897d15bf56d93036b7e9695

  • SHA1

    c87d4698baf231bcb6964a3d506d99ea7de87476

  • SHA256

    60f333b7195a6f96744c2da8ce32a521c9bd3e70dea54fd1f22e2823fae8d248

  • SHA512

    784de1fbd4378546e3cccd3c43d19073a35e48ce8ff7b8872747788cf4f9caba17b5f68e2c785ccd495df6bb90a9a33efb5d7253aee29db4912aa3a35df28d08

  • SSDEEP

    196608:sKXbeO7akwEI3CcdEsnSi4sLq3mEHdmJVgkO:N77I1EsSi4XmEHdme

Malware Config

Targets

    • Target

      60f333b7195a6f96744c2da8ce32a521c9bd3e70dea54fd1f22e2823fae8d248

    • Size

      13.2MB

    • MD5

      384c93cd6897d15bf56d93036b7e9695

    • SHA1

      c87d4698baf231bcb6964a3d506d99ea7de87476

    • SHA256

      60f333b7195a6f96744c2da8ce32a521c9bd3e70dea54fd1f22e2823fae8d248

    • SHA512

      784de1fbd4378546e3cccd3c43d19073a35e48ce8ff7b8872747788cf4f9caba17b5f68e2c785ccd495df6bb90a9a33efb5d7253aee29db4912aa3a35df28d08

    • SSDEEP

      196608:sKXbeO7akwEI3CcdEsnSi4sLq3mEHdmJVgkO:N77I1EsSi4XmEHdme

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks