General

  • Target

    b7b27bb86a167784e1b3b63ecc9402cfc6861bb913f18125b65bb0d9e0d5cab4

  • Size

    437KB

  • Sample

    240911-hyb3sayaqk

  • MD5

    9d080dee1132246ce6c974eaa14f3adf

  • SHA1

    4ddfb415820fdf1725e9ab7d46965ec9c80d7345

  • SHA256

    b7b27bb86a167784e1b3b63ecc9402cfc6861bb913f18125b65bb0d9e0d5cab4

  • SHA512

    be2de09862e9a4f83bb746fd616e20d22a2004fecc56b81e5e9fd01d32c4ea777c55695f82633ac532d9a43408813c8c9276bf6135c73bee55864ae47bc874a0

  • SSDEEP

    6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wi:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoS4

Malware Config

Targets

    • Target

      b7b27bb86a167784e1b3b63ecc9402cfc6861bb913f18125b65bb0d9e0d5cab4

    • Size

      437KB

    • MD5

      9d080dee1132246ce6c974eaa14f3adf

    • SHA1

      4ddfb415820fdf1725e9ab7d46965ec9c80d7345

    • SHA256

      b7b27bb86a167784e1b3b63ecc9402cfc6861bb913f18125b65bb0d9e0d5cab4

    • SHA512

      be2de09862e9a4f83bb746fd616e20d22a2004fecc56b81e5e9fd01d32c4ea777c55695f82633ac532d9a43408813c8c9276bf6135c73bee55864ae47bc874a0

    • SSDEEP

      6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wi:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoS4

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks