General

  • Target

    7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a

  • Size

    1.6MB

  • Sample

    240708-m849jaybnf

  • MD5

    251a802e8bb13e39fe89ac035ed6fefd

  • SHA1

    f429ee4243604981679ee4cba673773f2060ef23

  • SHA256

    7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a

  • SHA512

    fb520d84b406bdf877e68fd9de6da9484c0f58bf5344045113099ac19d444b45f0c898ff4a6f7b93ad2784aba2400023f9242c4ed5edcf03b56d4b03e07ff838

  • SSDEEP

    49152:2QZAdVyVT9n/Gg0P+WhowluvT5dyWRudqIqfovfK9:3GdVyVT9nOgmhrluL5dyWRudqIqf79

Malware Config

Targets

    • Target

      7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a

    • Size

      1.6MB

    • MD5

      251a802e8bb13e39fe89ac035ed6fefd

    • SHA1

      f429ee4243604981679ee4cba673773f2060ef23

    • SHA256

      7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a

    • SHA512

      fb520d84b406bdf877e68fd9de6da9484c0f58bf5344045113099ac19d444b45f0c898ff4a6f7b93ad2784aba2400023f9242c4ed5edcf03b56d4b03e07ff838

    • SSDEEP

      49152:2QZAdVyVT9n/Gg0P+WhowluvT5dyWRudqIqfovfK9:3GdVyVT9nOgmhrluL5dyWRudqIqf79

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks