General

  • Target

    090cfb72b72fb2f4e8d5dfb68da909f5003a5745d7f93438685edbac4a982bb5

  • Size

    437KB

  • Sample

    240915-v6awxavclc

  • MD5

    cb7c631a215dcb9631706e647b72881d

  • SHA1

    644bd9a8eba7f37067c733dc8d79b595b70dc836

  • SHA256

    090cfb72b72fb2f4e8d5dfb68da909f5003a5745d7f93438685edbac4a982bb5

  • SHA512

    67b687bb3f70f049ba9a78aa81b815ea7677be1e5e8e2b428434a1af667b58cf1908d0670adb9d9fb5eb35a802d8908407a55d08c61009c22d310a5a048be155

  • SSDEEP

    6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wg:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoS6

Malware Config

Targets

    • Target

      090cfb72b72fb2f4e8d5dfb68da909f5003a5745d7f93438685edbac4a982bb5

    • Size

      437KB

    • MD5

      cb7c631a215dcb9631706e647b72881d

    • SHA1

      644bd9a8eba7f37067c733dc8d79b595b70dc836

    • SHA256

      090cfb72b72fb2f4e8d5dfb68da909f5003a5745d7f93438685edbac4a982bb5

    • SHA512

      67b687bb3f70f049ba9a78aa81b815ea7677be1e5e8e2b428434a1af667b58cf1908d0670adb9d9fb5eb35a802d8908407a55d08c61009c22d310a5a048be155

    • SSDEEP

      6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wg:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoS6

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks