General

  • Target

    9c535c57bacf0df3572a93ed50ef4403c26d7c3c31dd8228f4113832baf20250

  • Size

    1.5MB

  • Sample

    240915-hb21pa1ann

  • MD5

    c2630dfbab91317430f81ec00e0713ec

  • SHA1

    9e213196897bb04c8f9ca65722ef04a902d5878f

  • SHA256

    9c535c57bacf0df3572a93ed50ef4403c26d7c3c31dd8228f4113832baf20250

  • SHA512

    b5f695dcd2ec49382c956a94fb44e51b8f902feeadfb5537e933e1a69b0a72b389e350f83e0ab169993ae455061a6ab061fa803a9d3514e6f875e2fc152df1ba

  • SSDEEP

    24576:NQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cV3SN5mmT7Ko:NQZAdVyVT9n/Gg0P+WhoPvfKo

Malware Config

Targets

    • Target

      9c535c57bacf0df3572a93ed50ef4403c26d7c3c31dd8228f4113832baf20250

    • Size

      1.5MB

    • MD5

      c2630dfbab91317430f81ec00e0713ec

    • SHA1

      9e213196897bb04c8f9ca65722ef04a902d5878f

    • SHA256

      9c535c57bacf0df3572a93ed50ef4403c26d7c3c31dd8228f4113832baf20250

    • SHA512

      b5f695dcd2ec49382c956a94fb44e51b8f902feeadfb5537e933e1a69b0a72b389e350f83e0ab169993ae455061a6ab061fa803a9d3514e6f875e2fc152df1ba

    • SSDEEP

      24576:NQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cV3SN5mmT7Ko:NQZAdVyVT9n/Gg0P+WhoPvfKo

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks