General

  • Target

    e57e284985633b840dd46273e8d834b5163542b5dfe84df08a90745d2230f42c

  • Size

    1.6MB

  • Sample

    240823-dss2wsvekp

  • MD5

    833c985671383fc6e3ed51314cdccd48

  • SHA1

    f5c40fc83fb5ca40444311db97d5e869656cafac

  • SHA256

    e57e284985633b840dd46273e8d834b5163542b5dfe84df08a90745d2230f42c

  • SHA512

    7f447a649b8979767fb9e2fe0c794f3e084d5826bb26a8baaa215362c98f60b60788a337b83c3b33d62d165c4f94b1b56a6ac11645c314cb56f367cca75fbe9e

  • SSDEEP

    24576:4QZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVQfJJsx/V1Dfun2y:4QZAdVyVT9n/Gg0P+WhoTJJsxLDmn2y

Malware Config

Targets

    • Target

      e57e284985633b840dd46273e8d834b5163542b5dfe84df08a90745d2230f42c

    • Size

      1.6MB

    • MD5

      833c985671383fc6e3ed51314cdccd48

    • SHA1

      f5c40fc83fb5ca40444311db97d5e869656cafac

    • SHA256

      e57e284985633b840dd46273e8d834b5163542b5dfe84df08a90745d2230f42c

    • SHA512

      7f447a649b8979767fb9e2fe0c794f3e084d5826bb26a8baaa215362c98f60b60788a337b83c3b33d62d165c4f94b1b56a6ac11645c314cb56f367cca75fbe9e

    • SSDEEP

      24576:4QZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVQfJJsx/V1Dfun2y:4QZAdVyVT9n/Gg0P+WhoTJJsxLDmn2y

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks