General

  • Target

    c95f34c2d2acd9ea5954c369fab97f0dc4d004e0e3d09b9c409e116d1ec460e8

  • Size

    11.9MB

  • Sample

    240821-z7mpba1dpa

  • MD5

    0d33913347c1579916f9a47ad5f0dfad

  • SHA1

    3dce11c1b0da7753e6b1e4cbf764a2cb8b479db4

  • SHA256

    c95f34c2d2acd9ea5954c369fab97f0dc4d004e0e3d09b9c409e116d1ec460e8

  • SHA512

    82841e9e04a2b6b4cbecc110d2afd3eb3b9a9279d6d142bda0371f1659d98c67a0fab01c4049bc7d0720a936dd9de683b21dd3bcb6189054a3c0c0c80c2c8b31

  • SSDEEP

    196608:MB0Bmpz+HjgXS5z59BXKKUWbMBrt86mCUPsNl+oHNJ9wlv:PBmpzbXSb98KfkrK6Jj+otolv

Malware Config

Targets

    • Target

      c95f34c2d2acd9ea5954c369fab97f0dc4d004e0e3d09b9c409e116d1ec460e8

    • Size

      11.9MB

    • MD5

      0d33913347c1579916f9a47ad5f0dfad

    • SHA1

      3dce11c1b0da7753e6b1e4cbf764a2cb8b479db4

    • SHA256

      c95f34c2d2acd9ea5954c369fab97f0dc4d004e0e3d09b9c409e116d1ec460e8

    • SHA512

      82841e9e04a2b6b4cbecc110d2afd3eb3b9a9279d6d142bda0371f1659d98c67a0fab01c4049bc7d0720a936dd9de683b21dd3bcb6189054a3c0c0c80c2c8b31

    • SSDEEP

      196608:MB0Bmpz+HjgXS5z59BXKKUWbMBrt86mCUPsNl+oHNJ9wlv:PBmpzbXSb98KfkrK6Jj+otolv

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks