General

  • Target

    9b29496d61b128884b9cbe07d1f2e2714d4d116bdcf4e71d336d3fbc4dd89a14

  • Size

    2.5MB

  • Sample

    240823-jwabvasgla

  • MD5

    b0838ce679e2f3d1bc72649a00b58e2a

  • SHA1

    87eceffe1e738abbe96738ecdcc83215ce937fa7

  • SHA256

    9b29496d61b128884b9cbe07d1f2e2714d4d116bdcf4e71d336d3fbc4dd89a14

  • SHA512

    cf6f2a460fb4c0073af3d5f71ae478fd401ffa32ae879eec8798e12eb866c4e5da4aabfc6ca5008c6068e4505ab5e962043719206b7de86530164fcd4cd729c9

  • SSDEEP

    24576:cCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHw:cCwsbCANnKXferL7Vwe/Gg0P+Whux4

Malware Config

Targets

    • Target

      9b29496d61b128884b9cbe07d1f2e2714d4d116bdcf4e71d336d3fbc4dd89a14

    • Size

      2.5MB

    • MD5

      b0838ce679e2f3d1bc72649a00b58e2a

    • SHA1

      87eceffe1e738abbe96738ecdcc83215ce937fa7

    • SHA256

      9b29496d61b128884b9cbe07d1f2e2714d4d116bdcf4e71d336d3fbc4dd89a14

    • SHA512

      cf6f2a460fb4c0073af3d5f71ae478fd401ffa32ae879eec8798e12eb866c4e5da4aabfc6ca5008c6068e4505ab5e962043719206b7de86530164fcd4cd729c9

    • SSDEEP

      24576:cCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHw:cCwsbCANnKXferL7Vwe/Gg0P+Whux4

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks