General

  • Target

    3873b5554c284c88f63e4e326fce17e79c754b6a06b27c4a8ecfb963d6728a50

  • Size

    4.4MB

  • Sample

    240918-x21mwayelg

  • MD5

    ecd67d66ccc1f71a46c59d9196fd1233

  • SHA1

    d8814e8fe013e5350641b4ea2b6478558be6ea01

  • SHA256

    3873b5554c284c88f63e4e326fce17e79c754b6a06b27c4a8ecfb963d6728a50

  • SHA512

    05eaf6d58744f83f3900b092fca6b2890c8aeef405dfa0c73b37536bb41b7326af3f1a1ad2661d2aa073c772103528cd3dd6c9a0ad0569988081e4c64e797d90

  • SSDEEP

    98304:Fws2ANnKXOaeOgmhUVSF4VQTXTgPsGv4ATCY2v:vKXbeO7pFSATguHY2v

Malware Config

Targets

    • Target

      3873b5554c284c88f63e4e326fce17e79c754b6a06b27c4a8ecfb963d6728a50

    • Size

      4.4MB

    • MD5

      ecd67d66ccc1f71a46c59d9196fd1233

    • SHA1

      d8814e8fe013e5350641b4ea2b6478558be6ea01

    • SHA256

      3873b5554c284c88f63e4e326fce17e79c754b6a06b27c4a8ecfb963d6728a50

    • SHA512

      05eaf6d58744f83f3900b092fca6b2890c8aeef405dfa0c73b37536bb41b7326af3f1a1ad2661d2aa073c772103528cd3dd6c9a0ad0569988081e4c64e797d90

    • SSDEEP

      98304:Fws2ANnKXOaeOgmhUVSF4VQTXTgPsGv4ATCY2v:vKXbeO7pFSATguHY2v

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks