General

  • Target

    126b5c45fac70b2ab75c4c61fbf449159a39ce1ddca34de277e41bcf0c5e25cb

  • Size

    2.6MB

  • Sample

    240823-dt7xfasfng

  • MD5

    8f0f57b33823be6de422ff95eca30275

  • SHA1

    90a0f07303002a86cbfc62f8a3a10de302741ecf

  • SHA256

    126b5c45fac70b2ab75c4c61fbf449159a39ce1ddca34de277e41bcf0c5e25cb

  • SHA512

    5a9c880e2845c8deb038a12c524c645c5f945444b33fefeff9a153fc806b67180acfd329af4e5f2623bd04653a3827ed11d53b16f624811d03cf54ec500bfb22

  • SSDEEP

    49152:UQZAdVyVT9n/Gg0P+WhoCJJsxLDmn2/nsHyjtk2MYC5GDvcNt:FGdVyVT9nOgmhfJJsxLDmn2/nsmtk2a1

Malware Config

Targets

    • Target

      126b5c45fac70b2ab75c4c61fbf449159a39ce1ddca34de277e41bcf0c5e25cb

    • Size

      2.6MB

    • MD5

      8f0f57b33823be6de422ff95eca30275

    • SHA1

      90a0f07303002a86cbfc62f8a3a10de302741ecf

    • SHA256

      126b5c45fac70b2ab75c4c61fbf449159a39ce1ddca34de277e41bcf0c5e25cb

    • SHA512

      5a9c880e2845c8deb038a12c524c645c5f945444b33fefeff9a153fc806b67180acfd329af4e5f2623bd04653a3827ed11d53b16f624811d03cf54ec500bfb22

    • SSDEEP

      49152:UQZAdVyVT9n/Gg0P+WhoCJJsxLDmn2/nsHyjtk2MYC5GDvcNt:FGdVyVT9nOgmhfJJsxLDmn2/nsmtk2a1

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks