General

  • Target

    f71f4e4477b1ff538bfe24bab57efca04bb7be9599303bf09b3881fdbecb4c68

  • Size

    1.3MB

  • Sample

    240726-gzs71svajh

  • MD5

    22c5a359e1e20fca321c080c6c0d85f1

  • SHA1

    27463e3bab887a31f538d20d2d048ff2308bcca2

  • SHA256

    f71f4e4477b1ff538bfe24bab57efca04bb7be9599303bf09b3881fdbecb4c68

  • SHA512

    4fb073ccfde1f964faf3426c671bbe707e982e436142c396ba8d4b496888d4fdd627ee2ed2289ff30ae2ccaa5cdd7ac59c2e914bbf5c92cec1eb2cc66f785e61

  • SSDEEP

    24576:jQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVGy0XAw:jQZAdVyVT9n/Gg0P+Who7XL

Malware Config

Targets

    • Target

      f71f4e4477b1ff538bfe24bab57efca04bb7be9599303bf09b3881fdbecb4c68

    • Size

      1.3MB

    • MD5

      22c5a359e1e20fca321c080c6c0d85f1

    • SHA1

      27463e3bab887a31f538d20d2d048ff2308bcca2

    • SHA256

      f71f4e4477b1ff538bfe24bab57efca04bb7be9599303bf09b3881fdbecb4c68

    • SHA512

      4fb073ccfde1f964faf3426c671bbe707e982e436142c396ba8d4b496888d4fdd627ee2ed2289ff30ae2ccaa5cdd7ac59c2e914bbf5c92cec1eb2cc66f785e61

    • SSDEEP

      24576:jQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVGy0XAw:jQZAdVyVT9n/Gg0P+Who7XL

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks