General

  • Target

    3005509e620dd3943eac7dce47f14ee991599de9197635567d76fe3a71d5570f

  • Size

    1.7MB

  • Sample

    240920-h23d5svape

  • MD5

    1d35e0ca041dfa5eacb9de1bd0ad4a9d

  • SHA1

    7c91790ce4fb566c7cd68885bf11c5b0e0e90fa4

  • SHA256

    3005509e620dd3943eac7dce47f14ee991599de9197635567d76fe3a71d5570f

  • SHA512

    41d31818cc31789b5b07350087532a7379131efe261d045a00f8d0d73d0117c28fac9e0747903bee938ff565bb62d752888c5c6458fd95b52459f39a4d492a73

  • SSDEEP

    24576:gQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVT4Ks3PNnx2qIyz:gQZAdVyVT9n/Gg0P+Whoi4Ks3P5x2C

Malware Config

Targets

    • Target

      3005509e620dd3943eac7dce47f14ee991599de9197635567d76fe3a71d5570f

    • Size

      1.7MB

    • MD5

      1d35e0ca041dfa5eacb9de1bd0ad4a9d

    • SHA1

      7c91790ce4fb566c7cd68885bf11c5b0e0e90fa4

    • SHA256

      3005509e620dd3943eac7dce47f14ee991599de9197635567d76fe3a71d5570f

    • SHA512

      41d31818cc31789b5b07350087532a7379131efe261d045a00f8d0d73d0117c28fac9e0747903bee938ff565bb62d752888c5c6458fd95b52459f39a4d492a73

    • SSDEEP

      24576:gQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVT4Ks3PNnx2qIyz:gQZAdVyVT9n/Gg0P+Whoi4Ks3P5x2C

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks