General

  • Target

    35473ffb0537c753b67fe73ad6dfb72a769938c9f1f608a02d43f4e8cfccf980

  • Size

    2.4MB

  • Sample

    240820-g98qfs1ern

  • MD5

    c989ca78892fc095e715c02213e80c91

  • SHA1

    3f805b2d752fc04564114650904bab7b645746ac

  • SHA256

    35473ffb0537c753b67fe73ad6dfb72a769938c9f1f608a02d43f4e8cfccf980

  • SHA512

    ad1fc96857d3965f5fc90fc97745fc46b49e9286a1a5f98d7ec1d8d8b7048573bb44143545e1239cc8449730121387d6f8d36fc7b7162123913d22d8e0450667

  • SSDEEP

    24576:KCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHi:KCwsbCANnKXferL7Vwe/Gg0P+WhR

Malware Config

Targets

    • Target

      35473ffb0537c753b67fe73ad6dfb72a769938c9f1f608a02d43f4e8cfccf980

    • Size

      2.4MB

    • MD5

      c989ca78892fc095e715c02213e80c91

    • SHA1

      3f805b2d752fc04564114650904bab7b645746ac

    • SHA256

      35473ffb0537c753b67fe73ad6dfb72a769938c9f1f608a02d43f4e8cfccf980

    • SHA512

      ad1fc96857d3965f5fc90fc97745fc46b49e9286a1a5f98d7ec1d8d8b7048573bb44143545e1239cc8449730121387d6f8d36fc7b7162123913d22d8e0450667

    • SSDEEP

      24576:KCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHi:KCwsbCANnKXferL7Vwe/Gg0P+WhR

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks