General

  • Target

    d2fb65c1e1f69030da8de2d201cde600N

  • Size

    542KB

  • Sample

    240826-pqcsnstdmg

  • MD5

    d2fb65c1e1f69030da8de2d201cde600

  • SHA1

    6f8d8d35606ff58e8054eea2b2c64939d8907f96

  • SHA256

    e60bd0a538b4d7f2016c5b9c2e083527f9ac7189cf9711efc1d359e573ac9a43

  • SHA512

    232c6092423111bcb1b71d746677aa731ea0e45972a0fd1b0798d8da68ff6de77456d316e6892b28556d365332ffd2ae72df76ebb3766c162fdfb5374aeda3c9

  • SSDEEP

    12288:f3DQLNkJyNkiJWGvGVnXpb+U2R3uo98pAOheajW:f3DQLN/NwymnXpb+UEeo9InhtjW

Malware Config

Targets

    • Target

      d2fb65c1e1f69030da8de2d201cde600N

    • Size

      542KB

    • MD5

      d2fb65c1e1f69030da8de2d201cde600

    • SHA1

      6f8d8d35606ff58e8054eea2b2c64939d8907f96

    • SHA256

      e60bd0a538b4d7f2016c5b9c2e083527f9ac7189cf9711efc1d359e573ac9a43

    • SHA512

      232c6092423111bcb1b71d746677aa731ea0e45972a0fd1b0798d8da68ff6de77456d316e6892b28556d365332ffd2ae72df76ebb3766c162fdfb5374aeda3c9

    • SSDEEP

      12288:f3DQLNkJyNkiJWGvGVnXpb+U2R3uo98pAOheajW:f3DQLN/NwymnXpb+UEeo9InhtjW

    • Blackmoon, KrBanker

      Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

    • Detect Blackmoon payload

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks