General

  • Target

    acd8532f6e98e5ab14048e76edeb10c9a2d008044ab9b25c62d18ba733e7abd8

  • Size

    2.3MB

  • Sample

    240822-f76yeatgnn

  • MD5

    aa4cad457fde76310994b2f72b6cc276

  • SHA1

    15378ce214a96f898cd7301b2b9332b2a2aab9ff

  • SHA256

    acd8532f6e98e5ab14048e76edeb10c9a2d008044ab9b25c62d18ba733e7abd8

  • SHA512

    76d6f3437cf8e8acd3cd671180d876ca6d3dbf83723df764b6b577eb83e8b4c072f024a35c5ed6eb4f17e6cfe611f005715bd9312474f5fb2939a5b7e173472c

  • SSDEEP

    49152:zQZAdVyVT9n/Gg0P+WhoOZPItx2apeapelI:0GdVyVT9nOgmhotUvlI

Malware Config

Targets

    • Target

      acd8532f6e98e5ab14048e76edeb10c9a2d008044ab9b25c62d18ba733e7abd8

    • Size

      2.3MB

    • MD5

      aa4cad457fde76310994b2f72b6cc276

    • SHA1

      15378ce214a96f898cd7301b2b9332b2a2aab9ff

    • SHA256

      acd8532f6e98e5ab14048e76edeb10c9a2d008044ab9b25c62d18ba733e7abd8

    • SHA512

      76d6f3437cf8e8acd3cd671180d876ca6d3dbf83723df764b6b577eb83e8b4c072f024a35c5ed6eb4f17e6cfe611f005715bd9312474f5fb2939a5b7e173472c

    • SSDEEP

      49152:zQZAdVyVT9n/Gg0P+WhoOZPItx2apeapelI:0GdVyVT9nOgmhotUvlI

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks