General

  • Target

    6ce66d7bd70b8897550aebbd9c4e8d159d6e1e1dc204c5ed264b740d038786a2

  • Size

    99KB

  • Sample

    240827-tj3gza1bjq

  • MD5

    d58d9aa093a7d5056a5c0a261076c28f

  • SHA1

    bdfcb52178ebce42af5fedfeb1bffcb15e5c5266

  • SHA256

    6ce66d7bd70b8897550aebbd9c4e8d159d6e1e1dc204c5ed264b740d038786a2

  • SHA512

    0cc8c530cf939b553cb6d3adfd84ee5f018119c459147e8d56a58c3fae593058008b22d70339b80689128f08dc25d5d6cdaf40bf9e86e96d3a02c7449726dd58

  • SSDEEP

    3072:YBpDP+McSV1UWe8w/OC/FR98LwvR8x7Mcp8i:U13cS8vPOVxpP

Malware Config

Targets

    • Target

      6ce66d7bd70b8897550aebbd9c4e8d159d6e1e1dc204c5ed264b740d038786a2

    • Size

      99KB

    • MD5

      d58d9aa093a7d5056a5c0a261076c28f

    • SHA1

      bdfcb52178ebce42af5fedfeb1bffcb15e5c5266

    • SHA256

      6ce66d7bd70b8897550aebbd9c4e8d159d6e1e1dc204c5ed264b740d038786a2

    • SHA512

      0cc8c530cf939b553cb6d3adfd84ee5f018119c459147e8d56a58c3fae593058008b22d70339b80689128f08dc25d5d6cdaf40bf9e86e96d3a02c7449726dd58

    • SSDEEP

      3072:YBpDP+McSV1UWe8w/OC/FR98LwvR8x7Mcp8i:U13cS8vPOVxpP

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks