General

  • Target

    eccf7a3ef4dfc24a447baa3770199937d23b6e33ba343a74d98841e7f2ea0bc1

  • Size

    2.4MB

  • Sample

    240921-sraw9aygqc

  • MD5

    580f868193df3d5030fb30748486c984

  • SHA1

    0b50c9bab4c06aec90170b946b88d61bdeb997b3

  • SHA256

    eccf7a3ef4dfc24a447baa3770199937d23b6e33ba343a74d98841e7f2ea0bc1

  • SHA512

    a74ff3d04737e60109a3a221298c41eea2366be71841bd97b0de988f2bee235967da32527df56f2e4658552679c7c09587d25fbfb770ed1e6aed7edbce57fabb

  • SSDEEP

    49152:DQZAdVyVT9n/Gg0P+WhohpejKs3P5x2iZPItx2apeapelI:kGdVyVT9nOgmh9jKs3P5x27tUvlI

Malware Config

Targets

    • Target

      eccf7a3ef4dfc24a447baa3770199937d23b6e33ba343a74d98841e7f2ea0bc1

    • Size

      2.4MB

    • MD5

      580f868193df3d5030fb30748486c984

    • SHA1

      0b50c9bab4c06aec90170b946b88d61bdeb997b3

    • SHA256

      eccf7a3ef4dfc24a447baa3770199937d23b6e33ba343a74d98841e7f2ea0bc1

    • SHA512

      a74ff3d04737e60109a3a221298c41eea2366be71841bd97b0de988f2bee235967da32527df56f2e4658552679c7c09587d25fbfb770ed1e6aed7edbce57fabb

    • SSDEEP

      49152:DQZAdVyVT9n/Gg0P+WhohpejKs3P5x2iZPItx2apeapelI:kGdVyVT9nOgmh9jKs3P5x27tUvlI

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks