General

  • Target

    9460c89e97b4918ab745fc6e013cfd904bc8c8aff1c7a53d850bd94dbb8823d4

  • Size

    1.7MB

  • Sample

    240917-hnmrjazekm

  • MD5

    846fd69ecb7c442c7ab51f3174bac26a

  • SHA1

    cd266cfb8b0ce0878ca57f1762579a7ab4da48f0

  • SHA256

    9460c89e97b4918ab745fc6e013cfd904bc8c8aff1c7a53d850bd94dbb8823d4

  • SHA512

    69912b20e8b9aed8556248704fafc8f02a3203b6f8f7cf14809d19bce816305a393d908c600fa403eed16e30fcbc7249c14fd214f67095b8dd9ecae3f73c93e7

  • SSDEEP

    49152:dQZAdVyVT9n/Gg0P+WhorKTKK4KKDyK5kZ1EEEEmEEE1EEEEEEEEEEEQKK1KKK1u:GGdVyVT9nOgmhuKTKK4KKDyK5kZ1EEE8

Malware Config

Targets

    • Target

      9460c89e97b4918ab745fc6e013cfd904bc8c8aff1c7a53d850bd94dbb8823d4

    • Size

      1.7MB

    • MD5

      846fd69ecb7c442c7ab51f3174bac26a

    • SHA1

      cd266cfb8b0ce0878ca57f1762579a7ab4da48f0

    • SHA256

      9460c89e97b4918ab745fc6e013cfd904bc8c8aff1c7a53d850bd94dbb8823d4

    • SHA512

      69912b20e8b9aed8556248704fafc8f02a3203b6f8f7cf14809d19bce816305a393d908c600fa403eed16e30fcbc7249c14fd214f67095b8dd9ecae3f73c93e7

    • SSDEEP

      49152:dQZAdVyVT9n/Gg0P+WhorKTKK4KKDyK5kZ1EEEEmEEE1EEEEEEEEEEEQKK1KKK1u:GGdVyVT9nOgmhuKTKK4KKDyK5kZ1EEE8

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks