General

  • Target

    2014b093c4288e6477ce682763b17cfeca56d19b993b460d4b4a97153e854196

  • Size

    2.0MB

  • Sample

    240922-rzmeksvaml

  • MD5

    97b4d9c69063826455dfc3e6ad8cdba4

  • SHA1

    931cd3f9752b6edda1e9c7d7a1d3cf1c2a5b4d0c

  • SHA256

    2014b093c4288e6477ce682763b17cfeca56d19b993b460d4b4a97153e854196

  • SHA512

    d875748ccb21739117cffec154f1585764b2a879c55c90dd9f466007be8cb76c40d44f959cf9a99d607bb07f6b20ab5d11f8e1a368d842941a7d562f61be6b17

  • SSDEEP

    49152:XQZAdVyVT9n/Gg0P+WhoBpe6gIZPItx2apeapelI:gGdVyVT9nOgmhV6gRtUvlI

Malware Config

Targets

    • Target

      2014b093c4288e6477ce682763b17cfeca56d19b993b460d4b4a97153e854196

    • Size

      2.0MB

    • MD5

      97b4d9c69063826455dfc3e6ad8cdba4

    • SHA1

      931cd3f9752b6edda1e9c7d7a1d3cf1c2a5b4d0c

    • SHA256

      2014b093c4288e6477ce682763b17cfeca56d19b993b460d4b4a97153e854196

    • SHA512

      d875748ccb21739117cffec154f1585764b2a879c55c90dd9f466007be8cb76c40d44f959cf9a99d607bb07f6b20ab5d11f8e1a368d842941a7d562f61be6b17

    • SSDEEP

      49152:XQZAdVyVT9n/Gg0P+WhoBpe6gIZPItx2apeapelI:gGdVyVT9nOgmhV6gRtUvlI

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks