General

  • Target

    a494a9258d9191755ed361bcd2ff47f0fba5ae1686d6ef824a0d7f4331d9ec65

  • Size

    437KB

  • Sample

    240818-gf38wa1fqn

  • MD5

    d258d17817131a5cba5041813cda306d

  • SHA1

    ae2baa457a2814a12f32bcaea16c6c8dd4460166

  • SHA256

    a494a9258d9191755ed361bcd2ff47f0fba5ae1686d6ef824a0d7f4331d9ec65

  • SHA512

    69ae2e100a53456a3881e10e723a4ce842a00ad9e601bd3964b1366f0a33d9fbe919a6733808b0413e1e72201226c04196755fe36906cec7da51e7985fbe4f8c

  • SSDEEP

    6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wc:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSG

Malware Config

Targets

    • Target

      a494a9258d9191755ed361bcd2ff47f0fba5ae1686d6ef824a0d7f4331d9ec65

    • Size

      437KB

    • MD5

      d258d17817131a5cba5041813cda306d

    • SHA1

      ae2baa457a2814a12f32bcaea16c6c8dd4460166

    • SHA256

      a494a9258d9191755ed361bcd2ff47f0fba5ae1686d6ef824a0d7f4331d9ec65

    • SHA512

      69ae2e100a53456a3881e10e723a4ce842a00ad9e601bd3964b1366f0a33d9fbe919a6733808b0413e1e72201226c04196755fe36906cec7da51e7985fbe4f8c

    • SSDEEP

      6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wc:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoSG

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks