General

  • Target

    38a1972c2a4ba29e07987c3bf573c0f4a30a61833ebe14fa0233f14fb2784f7c

  • Size

    4.8MB

  • Sample

    240823-dspdpsvejp

  • MD5

    45e3811aabcba68cced88360cfd0b734

  • SHA1

    73930c08a2c5ef2b71aa0118c1db9d0aa752660a

  • SHA256

    38a1972c2a4ba29e07987c3bf573c0f4a30a61833ebe14fa0233f14fb2784f7c

  • SHA512

    640fea590b1e1d646ee2991602805d14956fa865145b9e14cb3c1d901c3784d66920a52ef7ef1366a60c311afc5244d92681475475fe013258b9e473e2be34a4

  • SSDEEP

    49152:sQZAdVyVT9n/Gg0P+WhoLDmn2dbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHCr:NGdVyVT9nOgmhwDmn2dbXsPN5kiQaZ56

Malware Config

Targets

    • Target

      38a1972c2a4ba29e07987c3bf573c0f4a30a61833ebe14fa0233f14fb2784f7c

    • Size

      4.8MB

    • MD5

      45e3811aabcba68cced88360cfd0b734

    • SHA1

      73930c08a2c5ef2b71aa0118c1db9d0aa752660a

    • SHA256

      38a1972c2a4ba29e07987c3bf573c0f4a30a61833ebe14fa0233f14fb2784f7c

    • SHA512

      640fea590b1e1d646ee2991602805d14956fa865145b9e14cb3c1d901c3784d66920a52ef7ef1366a60c311afc5244d92681475475fe013258b9e473e2be34a4

    • SSDEEP

      49152:sQZAdVyVT9n/Gg0P+WhoLDmn2dbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHCr:NGdVyVT9nOgmhwDmn2dbXsPN5kiQaZ56

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks