General

  • Target

    d7d518976c9e748993cf1ac9d9dd62ce786919c2be4743fab237ba808cf35b06

  • Size

    3.1MB

  • Sample

    240923-sn27bstapf

  • MD5

    80dfce2c7b7aafb39a41e6882c654a7a

  • SHA1

    ff1ac38077e515ce9f1d44ffedea1be8ea25f9d8

  • SHA256

    d7d518976c9e748993cf1ac9d9dd62ce786919c2be4743fab237ba808cf35b06

  • SHA512

    348a42b4057843db99e9b6311793b3012e4d1c70aa45741287bb45a8a3c9950bad8406a461e16e1fa5bf420cc27df1dc70c418c0cd1aa9a2cd4d5a615988d4f5

  • SSDEEP

    49152:hCwsbCANnKXferL7Vwe/Gg0P+WhyaH+BrAfChpeCA0W2Z:Mws2ANnKXOaeOgmhyaydZx

Malware Config

Targets

    • Target

      d7d518976c9e748993cf1ac9d9dd62ce786919c2be4743fab237ba808cf35b06

    • Size

      3.1MB

    • MD5

      80dfce2c7b7aafb39a41e6882c654a7a

    • SHA1

      ff1ac38077e515ce9f1d44ffedea1be8ea25f9d8

    • SHA256

      d7d518976c9e748993cf1ac9d9dd62ce786919c2be4743fab237ba808cf35b06

    • SHA512

      348a42b4057843db99e9b6311793b3012e4d1c70aa45741287bb45a8a3c9950bad8406a461e16e1fa5bf420cc27df1dc70c418c0cd1aa9a2cd4d5a615988d4f5

    • SSDEEP

      49152:hCwsbCANnKXferL7Vwe/Gg0P+WhyaH+BrAfChpeCA0W2Z:Mws2ANnKXOaeOgmhyaydZx

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks