General

  • Target

    f07447684d6bd9fbade4eed74d8ee83bcf46a2dbc2619b50338b3355654c1393

  • Size

    2.4MB

  • Sample

    240820-pr1acswbjk

  • MD5

    5ce4e8a6bc8aa2c82921686cc1d42dcb

  • SHA1

    8160717fa50349840d9810a74c0e3d04e55f5de8

  • SHA256

    f07447684d6bd9fbade4eed74d8ee83bcf46a2dbc2619b50338b3355654c1393

  • SHA512

    b8c32d265633e74e662125b5310c8b27200d0517385fe80db112ba90d98dac5648fb6bd3d568840c0bd856ed8561ac2e4660a8d95961b1fdf4f696409699bb4b

  • SSDEEP

    24576:kCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHN:kCwsbCANnKXferL7Vwe/Gg0P+WhK9

Malware Config

Targets

    • Target

      f07447684d6bd9fbade4eed74d8ee83bcf46a2dbc2619b50338b3355654c1393

    • Size

      2.4MB

    • MD5

      5ce4e8a6bc8aa2c82921686cc1d42dcb

    • SHA1

      8160717fa50349840d9810a74c0e3d04e55f5de8

    • SHA256

      f07447684d6bd9fbade4eed74d8ee83bcf46a2dbc2619b50338b3355654c1393

    • SHA512

      b8c32d265633e74e662125b5310c8b27200d0517385fe80db112ba90d98dac5648fb6bd3d568840c0bd856ed8561ac2e4660a8d95961b1fdf4f696409699bb4b

    • SSDEEP

      24576:kCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHN:kCwsbCANnKXferL7Vwe/Gg0P+WhK9

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks