General

  • Target

    986f01a7f2ee9420d7a332eb0c8f433de0a9ccaf17bcd254dde03403d60ae720

  • Size

    1.2MB

  • Sample

    240821-mszn4sxgll

  • MD5

    a77b36449174d458981210bfaf922b32

  • SHA1

    21c6afb5b56f280da16eca8a1f14bf0bb76d8f27

  • SHA256

    986f01a7f2ee9420d7a332eb0c8f433de0a9ccaf17bcd254dde03403d60ae720

  • SHA512

    da7afb942e4e014ef9a2380f5ee6c582bb7eb4d8c6a9f61652ce3134c85ade368c6b309e6a7e9c7ed1e91c302644890db675ede871f680fb922412f01a9e6f1b

  • SSDEEP

    24576:RQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cV0p:RQZAdVyVT9n/Gg0P+Whopp

Malware Config

Targets

    • Target

      986f01a7f2ee9420d7a332eb0c8f433de0a9ccaf17bcd254dde03403d60ae720

    • Size

      1.2MB

    • MD5

      a77b36449174d458981210bfaf922b32

    • SHA1

      21c6afb5b56f280da16eca8a1f14bf0bb76d8f27

    • SHA256

      986f01a7f2ee9420d7a332eb0c8f433de0a9ccaf17bcd254dde03403d60ae720

    • SHA512

      da7afb942e4e014ef9a2380f5ee6c582bb7eb4d8c6a9f61652ce3134c85ade368c6b309e6a7e9c7ed1e91c302644890db675ede871f680fb922412f01a9e6f1b

    • SSDEEP

      24576:RQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cV0p:RQZAdVyVT9n/Gg0P+Whopp

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks