General

  • Target

    2d13b1949b6618a305e09403e326e260b04dbb412f4b29ab5939fe14c0f1cd02

  • Size

    1.8MB

  • Sample

    240816-jhyghssgnd

  • MD5

    0efdac88807327d6aabd91a2bf7c2ca0

  • SHA1

    76842443b4636a62ec99323506f10ab56744d42d

  • SHA256

    2d13b1949b6618a305e09403e326e260b04dbb412f4b29ab5939fe14c0f1cd02

  • SHA512

    c48181a571c32a96eb6d88e2798d4f84b390a90b2ce35ee1193b3a6b27d86a32bb957474688fdb46ce987b62aa5313b1d43e6048047b6729bef2c1db0b28c65b

  • SSDEEP

    24576:YQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVFV1Dfun2L:YQZAdVyVT9n/Gg0P+WhoCDmn2L

Malware Config

Targets

    • Target

      2d13b1949b6618a305e09403e326e260b04dbb412f4b29ab5939fe14c0f1cd02

    • Size

      1.8MB

    • MD5

      0efdac88807327d6aabd91a2bf7c2ca0

    • SHA1

      76842443b4636a62ec99323506f10ab56744d42d

    • SHA256

      2d13b1949b6618a305e09403e326e260b04dbb412f4b29ab5939fe14c0f1cd02

    • SHA512

      c48181a571c32a96eb6d88e2798d4f84b390a90b2ce35ee1193b3a6b27d86a32bb957474688fdb46ce987b62aa5313b1d43e6048047b6729bef2c1db0b28c65b

    • SSDEEP

      24576:YQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVFV1Dfun2L:YQZAdVyVT9n/Gg0P+WhoCDmn2L

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks