General

  • Target

    16d4891f89ecc141447473580344971ef4ca1f5d47dcb01e19569d7d85abab50

  • Size

    611KB

  • Sample

    240910-e4k14ayclb

  • MD5

    7764290cdba013b7b0b67cabdc6b0c65

  • SHA1

    f394fb2d24715883b989441bdf790790918f7b5b

  • SHA256

    16d4891f89ecc141447473580344971ef4ca1f5d47dcb01e19569d7d85abab50

  • SHA512

    69ed66ffe1138c44f76e955e73f9b8646a8fad04ba595f84d283adb4a4d673aa6118c2bd4aa755a592e860111566dbf5ef3883e710d1fd11f269422eda1f9239

  • SSDEEP

    12288:1FpuzZSkcBNrl5mTEUkDaSdJfpSaoNRVBUyMCe8VMM80B7qrI3iK1XBwZQ:1FmShDrngEUkDaiJfpSaoNRpMCe8CM8T

Malware Config

Targets

    • Target

      16d4891f89ecc141447473580344971ef4ca1f5d47dcb01e19569d7d85abab50

    • Size

      611KB

    • MD5

      7764290cdba013b7b0b67cabdc6b0c65

    • SHA1

      f394fb2d24715883b989441bdf790790918f7b5b

    • SHA256

      16d4891f89ecc141447473580344971ef4ca1f5d47dcb01e19569d7d85abab50

    • SHA512

      69ed66ffe1138c44f76e955e73f9b8646a8fad04ba595f84d283adb4a4d673aa6118c2bd4aa755a592e860111566dbf5ef3883e710d1fd11f269422eda1f9239

    • SSDEEP

      12288:1FpuzZSkcBNrl5mTEUkDaSdJfpSaoNRVBUyMCe8VMM80B7qrI3iK1XBwZQ:1FmShDrngEUkDaiJfpSaoNRpMCe8CM8T

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks