General

  • Target

    7244708a96a97b38ff6f1a2fb9488f6152cfa56829ed14599e50cdab30b7bcc2

  • Size

    437KB

  • Sample

    240923-htqelsybrg

  • MD5

    9e9edf966038dc43898881bec2e11ff3

  • SHA1

    cf7cf436fad2c6346b9537e34bc3a7fdaa97cab2

  • SHA256

    7244708a96a97b38ff6f1a2fb9488f6152cfa56829ed14599e50cdab30b7bcc2

  • SHA512

    c97c53f42c86978f75b18e63a8c7c1f6ed4dbdfd6c14887c3ef48b9035952302d7de2aaa8e3cdc705258e618a232dfdb392e0d02019d386e897a31df545148c2

  • SSDEEP

    6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wv:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoS1

Malware Config

Targets

    • Target

      7244708a96a97b38ff6f1a2fb9488f6152cfa56829ed14599e50cdab30b7bcc2

    • Size

      437KB

    • MD5

      9e9edf966038dc43898881bec2e11ff3

    • SHA1

      cf7cf436fad2c6346b9537e34bc3a7fdaa97cab2

    • SHA256

      7244708a96a97b38ff6f1a2fb9488f6152cfa56829ed14599e50cdab30b7bcc2

    • SHA512

      c97c53f42c86978f75b18e63a8c7c1f6ed4dbdfd6c14887c3ef48b9035952302d7de2aaa8e3cdc705258e618a232dfdb392e0d02019d386e897a31df545148c2

    • SSDEEP

      6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wv:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoS1

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks