General

  • Target

    f175027d8999bc35d83937009792f57e58e8915742400c9f96f46e8a30b7f2f2

  • Size

    1.1MB

  • Sample

    240912-jyygfsygna

  • MD5

    c1b0e1a092570eefaee61ed2e163a1c2

  • SHA1

    c343ad9ffd99039d9bd4e52bbf415b2d8f309d48

  • SHA256

    f175027d8999bc35d83937009792f57e58e8915742400c9f96f46e8a30b7f2f2

  • SHA512

    426c35c5f40585979571a765ff2a67bc31cc3a627d3f71b76800344d7b7d6ee23388fd06ebfe747ff9cb970468c9a37d862e57c89d9a853e4c8fc7d43ed6e554

  • SSDEEP

    24576:f09tv9/7JtDElDEExIko2H2HESq2eWJ6MQjySjy+h2Z:f09XJt4HIN2H2tFvduySj+

Malware Config

Targets

    • Target

      f175027d8999bc35d83937009792f57e58e8915742400c9f96f46e8a30b7f2f2

    • Size

      1.1MB

    • MD5

      c1b0e1a092570eefaee61ed2e163a1c2

    • SHA1

      c343ad9ffd99039d9bd4e52bbf415b2d8f309d48

    • SHA256

      f175027d8999bc35d83937009792f57e58e8915742400c9f96f46e8a30b7f2f2

    • SHA512

      426c35c5f40585979571a765ff2a67bc31cc3a627d3f71b76800344d7b7d6ee23388fd06ebfe747ff9cb970468c9a37d862e57c89d9a853e4c8fc7d43ed6e554

    • SSDEEP

      24576:f09tv9/7JtDElDEExIko2H2HESq2eWJ6MQjySjy+h2Z:f09XJt4HIN2H2tFvduySj+

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks