General

  • Target

    f138c39f9346ee1df897d2bafd161f8cf75763418d08a3b9c40b87e5b4ed5c3c

  • Size

    1.5MB

  • Sample

    240916-s1prrsvhmj

  • MD5

    1b80c1ead99e31c4740bd48c80c2fd21

  • SHA1

    d8550eb6856d3f6b56117d4cc02db7f0f50f368d

  • SHA256

    f138c39f9346ee1df897d2bafd161f8cf75763418d08a3b9c40b87e5b4ed5c3c

  • SHA512

    06f516030318751712773e514b65462d219a2c85f657681c9eb649bbc64ff0881e7169ea0c5043b293e2e5579b818b211c16cd1d144d6ea3b3cc38c07fcf7dc3

  • SSDEEP

    24576:UQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVLwpeYSJx24W:UQZAdVyVT9n/Gg0P+Who1perg4W

Malware Config

Targets

    • Target

      f138c39f9346ee1df897d2bafd161f8cf75763418d08a3b9c40b87e5b4ed5c3c

    • Size

      1.5MB

    • MD5

      1b80c1ead99e31c4740bd48c80c2fd21

    • SHA1

      d8550eb6856d3f6b56117d4cc02db7f0f50f368d

    • SHA256

      f138c39f9346ee1df897d2bafd161f8cf75763418d08a3b9c40b87e5b4ed5c3c

    • SHA512

      06f516030318751712773e514b65462d219a2c85f657681c9eb649bbc64ff0881e7169ea0c5043b293e2e5579b818b211c16cd1d144d6ea3b3cc38c07fcf7dc3

    • SSDEEP

      24576:UQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVLwpeYSJx24W:UQZAdVyVT9n/Gg0P+Who1perg4W

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks