General

  • Target

    5616434bfb2826d6b765c79a6f9eff3dad41ff3a857465a72501f0653481d38c

  • Size

    4.6MB

  • Sample

    240829-cxymhazalf

  • MD5

    b8e8fa23ad163c5902790b0a1543a19d

  • SHA1

    36e2723a2fc04c507a86dd331e108eae1f1f8a27

  • SHA256

    5616434bfb2826d6b765c79a6f9eff3dad41ff3a857465a72501f0653481d38c

  • SHA512

    62af8562e91431a519f04d335b3c27ec6f0f1a761ab391dcc16d8044689cd2e7e09081197750d499d9892b80da65e6863b350a0d3d405e39af96d7cc949f5f4c

  • SSDEEP

    49152:IQZAdVyVT9n/Gg0P+Who4bXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8b8R:hGdVyVT9nOgmhPbXsPN5kiQaZ56

Malware Config

Targets

    • Target

      5616434bfb2826d6b765c79a6f9eff3dad41ff3a857465a72501f0653481d38c

    • Size

      4.6MB

    • MD5

      b8e8fa23ad163c5902790b0a1543a19d

    • SHA1

      36e2723a2fc04c507a86dd331e108eae1f1f8a27

    • SHA256

      5616434bfb2826d6b765c79a6f9eff3dad41ff3a857465a72501f0653481d38c

    • SHA512

      62af8562e91431a519f04d335b3c27ec6f0f1a761ab391dcc16d8044689cd2e7e09081197750d499d9892b80da65e6863b350a0d3d405e39af96d7cc949f5f4c

    • SSDEEP

      49152:IQZAdVyVT9n/Gg0P+Who4bXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8b8R:hGdVyVT9nOgmhPbXsPN5kiQaZ56

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks