General

  • Target

    a88eb6a4224ceca56c0c978ad25c2da0N.exe

  • Size

    1.4MB

  • Sample

    240818-d5cwfatanh

  • MD5

    a88eb6a4224ceca56c0c978ad25c2da0

  • SHA1

    a515573bd95bc9ce61626482702e206059114e41

  • SHA256

    ba5ed24f92f488ae088014be2551860e5fcc38a47c6932a66cb3b9104a48719a

  • SHA512

    4cdb0c6188e15184a53effa3cc41577794e5e67f7ffd6b2c35d2b8ef1f1f4fdc2a50e0524ac0cb1a1c749227ee4ec7e1d8bd8c92437aba5a0f3b5f6769013488

  • SSDEEP

    24576:iQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cV4raBfp:iQZAdVyVT9n/Gg0P+WhoIp

Malware Config

Targets

    • Target

      a88eb6a4224ceca56c0c978ad25c2da0N.exe

    • Size

      1.4MB

    • MD5

      a88eb6a4224ceca56c0c978ad25c2da0

    • SHA1

      a515573bd95bc9ce61626482702e206059114e41

    • SHA256

      ba5ed24f92f488ae088014be2551860e5fcc38a47c6932a66cb3b9104a48719a

    • SHA512

      4cdb0c6188e15184a53effa3cc41577794e5e67f7ffd6b2c35d2b8ef1f1f4fdc2a50e0524ac0cb1a1c749227ee4ec7e1d8bd8c92437aba5a0f3b5f6769013488

    • SSDEEP

      24576:iQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cV4raBfp:iQZAdVyVT9n/Gg0P+WhoIp

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks