Resubmissions

03-09-2024 18:53

240903-xj23zsterl 10

03-09-2024 17:37

240903-v7dn7atbpe 10

General

  • Target

    519b969f1f7fd87af73a46e1dc3e32555912e485f61e9a0564a013b9d7f94b4b

  • Size

    1.4MB

  • Sample

    240903-v7dn7atbpe

  • MD5

    45c2c0d751ec6e72621ab95996d08c57

  • SHA1

    5bfe5dacb24b35757a0dc094dbd71199f6fa1ab5

  • SHA256

    519b969f1f7fd87af73a46e1dc3e32555912e485f61e9a0564a013b9d7f94b4b

  • SHA512

    b32fa5e54807fd43a6b53eeb3fa3d02390a0507ff3fff7398c2b95effdc9e022373efd34cd16a96cb506bf602fc5cda1b2c31dd5da44804aecb2f26472601a38

  • SSDEEP

    24576:NQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cV8x/V1Dfun2g:NQZAdVyVT9n/Gg0P+WhorxLDmn2g

Malware Config

Targets

    • Target

      519b969f1f7fd87af73a46e1dc3e32555912e485f61e9a0564a013b9d7f94b4b

    • Size

      1.4MB

    • MD5

      45c2c0d751ec6e72621ab95996d08c57

    • SHA1

      5bfe5dacb24b35757a0dc094dbd71199f6fa1ab5

    • SHA256

      519b969f1f7fd87af73a46e1dc3e32555912e485f61e9a0564a013b9d7f94b4b

    • SHA512

      b32fa5e54807fd43a6b53eeb3fa3d02390a0507ff3fff7398c2b95effdc9e022373efd34cd16a96cb506bf602fc5cda1b2c31dd5da44804aecb2f26472601a38

    • SSDEEP

      24576:NQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cV8x/V1Dfun2g:NQZAdVyVT9n/Gg0P+WhorxLDmn2g

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks