General

  • Target

    f216d60851daf05c5f91b1b0e26339a9aafc672e8fff8ff4d81bc3eaaf492134

  • Size

    1.2MB

  • Sample

    240908-mj1vta1dmm

  • MD5

    e2a04077ce792bad7a84bd3bcddf4ecc

  • SHA1

    7dbc74c2b2fa710a0989599fda172aa7fda52f2e

  • SHA256

    f216d60851daf05c5f91b1b0e26339a9aafc672e8fff8ff4d81bc3eaaf492134

  • SHA512

    3ce0c4a177e32532a743ccb57ba221008ded82e40f5b6f52b30f87d5b8b87b58fedf5dbe9c23a1b82a86b15825ebf6fd7a0599380c1e75cf1a615cc5c310c9a2

  • SSDEEP

    24576:9WnukjaDKSnYBzaJbjSoGF9LzpELx3N/nHwhHK28URjX+0:MnTjaD/9v6Vcx9HwNhu0

Malware Config

Targets

    • Target

      f216d60851daf05c5f91b1b0e26339a9aafc672e8fff8ff4d81bc3eaaf492134

    • Size

      1.2MB

    • MD5

      e2a04077ce792bad7a84bd3bcddf4ecc

    • SHA1

      7dbc74c2b2fa710a0989599fda172aa7fda52f2e

    • SHA256

      f216d60851daf05c5f91b1b0e26339a9aafc672e8fff8ff4d81bc3eaaf492134

    • SHA512

      3ce0c4a177e32532a743ccb57ba221008ded82e40f5b6f52b30f87d5b8b87b58fedf5dbe9c23a1b82a86b15825ebf6fd7a0599380c1e75cf1a615cc5c310c9a2

    • SSDEEP

      24576:9WnukjaDKSnYBzaJbjSoGF9LzpELx3N/nHwhHK28URjX+0:MnTjaD/9v6Vcx9HwNhu0

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks