General

  • Target

    26496bc50b0a030effdb6865d71e371c88564bc93599b3552f178fd9fe031e0a

  • Size

    2.8MB

  • Sample

    240705-fq5n1swakh

  • MD5

    af3d4af0368b57484ecfd657b27d27f0

  • SHA1

    c0711ee723b0d11a39f1faa8ad574de8ac763623

  • SHA256

    26496bc50b0a030effdb6865d71e371c88564bc93599b3552f178fd9fe031e0a

  • SHA512

    1dfd8adde5cbde08a32fac39cc05fddd81fe02b4d5276aa4f8185278ea83633ae79dc316392f7f33ee7f633fe6cbdc8e4ab2636695ec87132cef537761d866d8

  • SSDEEP

    49152:fCwsbCANnKXferL7Vwe/Gg0P+Whjy1hXJj:Kws2ANnKXOaeOgmhIXB

Malware Config

Targets

    • Target

      26496bc50b0a030effdb6865d71e371c88564bc93599b3552f178fd9fe031e0a

    • Size

      2.8MB

    • MD5

      af3d4af0368b57484ecfd657b27d27f0

    • SHA1

      c0711ee723b0d11a39f1faa8ad574de8ac763623

    • SHA256

      26496bc50b0a030effdb6865d71e371c88564bc93599b3552f178fd9fe031e0a

    • SHA512

      1dfd8adde5cbde08a32fac39cc05fddd81fe02b4d5276aa4f8185278ea83633ae79dc316392f7f33ee7f633fe6cbdc8e4ab2636695ec87132cef537761d866d8

    • SSDEEP

      49152:fCwsbCANnKXferL7Vwe/Gg0P+Whjy1hXJj:Kws2ANnKXOaeOgmhIXB

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks