General

  • Target

    237d185bd2a453c3844e5af842b8598f4f2af237b0404821918ed042bb10c52b

  • Size

    4.7MB

  • Sample

    240922-rznmmsvakg

  • MD5

    96194541ead87aaf67c3e831863d5034

  • SHA1

    6adfdb9ba911db396ea231b43083d98e2e2cf470

  • SHA256

    237d185bd2a453c3844e5af842b8598f4f2af237b0404821918ed042bb10c52b

  • SHA512

    5ff7e43dfa16ac9e15feb99f170b05de2400df62d13df0cd26e62772de97e3cd9e059d5caac3cf2399e299f695ffbdf9acf11079fc1ab84b1da48a12f4cd9e4f

  • SSDEEP

    49152:SQZAdVyVT9n/Gg0P+WhowgIbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8w:LGdVyVT9nOgmhjgIbXsPN5kiQaZ56

Malware Config

Targets

    • Target

      237d185bd2a453c3844e5af842b8598f4f2af237b0404821918ed042bb10c52b

    • Size

      4.7MB

    • MD5

      96194541ead87aaf67c3e831863d5034

    • SHA1

      6adfdb9ba911db396ea231b43083d98e2e2cf470

    • SHA256

      237d185bd2a453c3844e5af842b8598f4f2af237b0404821918ed042bb10c52b

    • SHA512

      5ff7e43dfa16ac9e15feb99f170b05de2400df62d13df0cd26e62772de97e3cd9e059d5caac3cf2399e299f695ffbdf9acf11079fc1ab84b1da48a12f4cd9e4f

    • SSDEEP

      49152:SQZAdVyVT9n/Gg0P+WhowgIbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8w:LGdVyVT9nOgmhjgIbXsPN5kiQaZ56

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks