General

  • Target

    871b52a8e48e2524bd694e46d7df72dc41453f023542df4ab27f1069a423b243

  • Size

    2.3MB

  • Sample

    240920-jt4snswdnc

  • MD5

    b13d48dd704fd9f376c67503c73aa6af

  • SHA1

    927ca3f2f5833e0870701f64496979789b55b08f

  • SHA256

    871b52a8e48e2524bd694e46d7df72dc41453f023542df4ab27f1069a423b243

  • SHA512

    bdf05ad96754664c89b8896be5208dde54544354ef85712cfbd6a2551c3dafd7384abcdf7b66526f3dc09434782fa512f86f6e233da2e31c30c03f67a3c93ba4

  • SSDEEP

    49152:lQZAdVyVT9n/Gg0P+Whow3tGa9nsHyjtk2MYC5GDJZ1:+GdVyVT9nOgmhV3tGa9nsmtk2aWZ1

Malware Config

Targets

    • Target

      871b52a8e48e2524bd694e46d7df72dc41453f023542df4ab27f1069a423b243

    • Size

      2.3MB

    • MD5

      b13d48dd704fd9f376c67503c73aa6af

    • SHA1

      927ca3f2f5833e0870701f64496979789b55b08f

    • SHA256

      871b52a8e48e2524bd694e46d7df72dc41453f023542df4ab27f1069a423b243

    • SHA512

      bdf05ad96754664c89b8896be5208dde54544354ef85712cfbd6a2551c3dafd7384abcdf7b66526f3dc09434782fa512f86f6e233da2e31c30c03f67a3c93ba4

    • SSDEEP

      49152:lQZAdVyVT9n/Gg0P+Whow3tGa9nsHyjtk2MYC5GDJZ1:+GdVyVT9nOgmhV3tGa9nsmtk2aWZ1

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks