General

  • Target

    d863048a878e4638d31f09148d49bedc6f15bf0c03bdc81d23d2b06406cf84f8

  • Size

    4.8MB

  • Sample

    240924-vfglrstgnk

  • MD5

    29e5d172247bb476b68d4517f2f41454

  • SHA1

    c2169ab778bad34cc2ae3336af16f433312e01c6

  • SHA256

    d863048a878e4638d31f09148d49bedc6f15bf0c03bdc81d23d2b06406cf84f8

  • SHA512

    df284efca20a5dc1d644d9df6e27f77f60c588a44ae26c96d70a0db8d393ae3b1c90605e6d6b3e0094d8e8551b170fbc0d67c6585581638773be9cb1fc87e6d2

  • SSDEEP

    98304:1ws2ANnKXOaeOgmh/SRRRRRRRR7S58bbTIuCysWngBSu/HHZR:/KXbeO7JSRRRRRRRR7eGTEye

Malware Config

Targets

    • Target

      d863048a878e4638d31f09148d49bedc6f15bf0c03bdc81d23d2b06406cf84f8

    • Size

      4.8MB

    • MD5

      29e5d172247bb476b68d4517f2f41454

    • SHA1

      c2169ab778bad34cc2ae3336af16f433312e01c6

    • SHA256

      d863048a878e4638d31f09148d49bedc6f15bf0c03bdc81d23d2b06406cf84f8

    • SHA512

      df284efca20a5dc1d644d9df6e27f77f60c588a44ae26c96d70a0db8d393ae3b1c90605e6d6b3e0094d8e8551b170fbc0d67c6585581638773be9cb1fc87e6d2

    • SSDEEP

      98304:1ws2ANnKXOaeOgmh/SRRRRRRRR7S58bbTIuCysWngBSu/HHZR:/KXbeO7JSRRRRRRRR7eGTEye

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks