General

  • Target

    bdc1246dde3caddfe5e193b1a649f5f0N.exe

  • Size

    8.2MB

  • Sample

    240816-jvhxlaxfpp

  • MD5

    bdc1246dde3caddfe5e193b1a649f5f0

  • SHA1

    8d79d61cc24872b121b22d87cbf708df321680e8

  • SHA256

    f7c0bb76949619b9aeecab860f7cc5dc9cf013419e10aaca1daef8aafae1fea0

  • SHA512

    86d2247c34c8da4e91d9ca558ad018cb2c10f3e752dcf70c682c2eaf1fa813a629de48671933bf9ac81ea9f7a396cb227cbff3a9c0b1f7f5f9828e9186602dca

  • SSDEEP

    196608:cphvilM0yV46scL0prmkBE7yqXhkUtf+woXFmtFULPW+iA7zc7HIw:2hvilMzdH2yNhkkfAX0FUa+N7zc7HIw

Malware Config

Targets

    • Target

      bdc1246dde3caddfe5e193b1a649f5f0N.exe

    • Size

      8.2MB

    • MD5

      bdc1246dde3caddfe5e193b1a649f5f0

    • SHA1

      8d79d61cc24872b121b22d87cbf708df321680e8

    • SHA256

      f7c0bb76949619b9aeecab860f7cc5dc9cf013419e10aaca1daef8aafae1fea0

    • SHA512

      86d2247c34c8da4e91d9ca558ad018cb2c10f3e752dcf70c682c2eaf1fa813a629de48671933bf9ac81ea9f7a396cb227cbff3a9c0b1f7f5f9828e9186602dca

    • SSDEEP

      196608:cphvilM0yV46scL0prmkBE7yqXhkUtf+woXFmtFULPW+iA7zc7HIw:2hvilMzdH2yNhkkfAX0FUa+N7zc7HIw

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks