General

  • Target

    2637c4620bc7402a82e2bf796d91519fabaaabd8d8833894b227a94733ef28b2

  • Size

    1020KB

  • Sample

    240829-xxvaaswhph

  • MD5

    5376d5072d2ccba215af9133c0324d17

  • SHA1

    6b9d6cd3469f051f9a2934ed1630dce4458b4786

  • SHA256

    2637c4620bc7402a82e2bf796d91519fabaaabd8d8833894b227a94733ef28b2

  • SHA512

    cc2da832de5afe8dac1af5f680423e69acf05cabcae42462fce374ac1f736604e05a5936f417073bde3791050baec3ebe602f14a7584448128547d00b3d7d682

  • SSDEEP

    24576:VdNqxOmV75VgTf/K43Xb/Is8kBCkr1Hx1qY1L+KPHO7JhhH5V+:KV7Ef/KcXUs8kBZJHiOL+KPHO7h5o

Malware Config

Targets

    • Target

      2637c4620bc7402a82e2bf796d91519fabaaabd8d8833894b227a94733ef28b2

    • Size

      1020KB

    • MD5

      5376d5072d2ccba215af9133c0324d17

    • SHA1

      6b9d6cd3469f051f9a2934ed1630dce4458b4786

    • SHA256

      2637c4620bc7402a82e2bf796d91519fabaaabd8d8833894b227a94733ef28b2

    • SHA512

      cc2da832de5afe8dac1af5f680423e69acf05cabcae42462fce374ac1f736604e05a5936f417073bde3791050baec3ebe602f14a7584448128547d00b3d7d682

    • SSDEEP

      24576:VdNqxOmV75VgTf/K43Xb/Is8kBCkr1Hx1qY1L+KPHO7JhhH5V+:KV7Ef/KcXUs8kBZJHiOL+KPHO7h5o

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops startup file

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks