General

  • Target

    521c1ee4fbdee36ac39bb8fc9c98c8a79d28b786be770bf223e242c0ef688a2a

  • Size

    1.4MB

  • Sample

    240822-f76yeatgnm

  • MD5

    17ad263be91577b6486025c83cb65e03

  • SHA1

    8fabf27f115a9e0835d3e5fa5fea91313dcf5e6a

  • SHA256

    521c1ee4fbdee36ac39bb8fc9c98c8a79d28b786be770bf223e242c0ef688a2a

  • SHA512

    08b874e25d1fbd1bdf3d132fbeff414799f5c18b122346caf19b99be3dce8e67d0755ddbec92708ba6f8ee2411e7e23a283ea0290c8c888d3aa984811f2b6d23

  • SSDEEP

    24576:sQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVnYmFk:sQZAdVyVT9n/Gg0P+WhomYF

Malware Config

Targets

    • Target

      521c1ee4fbdee36ac39bb8fc9c98c8a79d28b786be770bf223e242c0ef688a2a

    • Size

      1.4MB

    • MD5

      17ad263be91577b6486025c83cb65e03

    • SHA1

      8fabf27f115a9e0835d3e5fa5fea91313dcf5e6a

    • SHA256

      521c1ee4fbdee36ac39bb8fc9c98c8a79d28b786be770bf223e242c0ef688a2a

    • SHA512

      08b874e25d1fbd1bdf3d132fbeff414799f5c18b122346caf19b99be3dce8e67d0755ddbec92708ba6f8ee2411e7e23a283ea0290c8c888d3aa984811f2b6d23

    • SSDEEP

      24576:sQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVnYmFk:sQZAdVyVT9n/Gg0P+WhomYF

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks