General

  • Target

    fec4bc02d6327dfe396635b87b642cfd5d4fbcfbf951e23b3e2dfd839285b382

  • Size

    2.0MB

  • Sample

    240925-eltkhstgpl

  • MD5

    2d47c5dfafadd7c7974be14370517fc0

  • SHA1

    a4ca61746045adc930dac56179e589b9696b641f

  • SHA256

    fec4bc02d6327dfe396635b87b642cfd5d4fbcfbf951e23b3e2dfd839285b382

  • SHA512

    eebaefda6914c2d8b8c1ff8c112c2f217910412e43a801cffb0df11a7d9849a654cbdf13e3b83cd669e2afd75693841da707f088a47089269d2822654dcd90ed

  • SSDEEP

    49152:bM8kreqST3gNH92gVmc//////ZTVJ50BSRc0OlYouOP8GPhLZB:se53gNH92gVmc///////J5pW0Qui8GPt

Malware Config

Targets

    • Target

      fec4bc02d6327dfe396635b87b642cfd5d4fbcfbf951e23b3e2dfd839285b382

    • Size

      2.0MB

    • MD5

      2d47c5dfafadd7c7974be14370517fc0

    • SHA1

      a4ca61746045adc930dac56179e589b9696b641f

    • SHA256

      fec4bc02d6327dfe396635b87b642cfd5d4fbcfbf951e23b3e2dfd839285b382

    • SHA512

      eebaefda6914c2d8b8c1ff8c112c2f217910412e43a801cffb0df11a7d9849a654cbdf13e3b83cd669e2afd75693841da707f088a47089269d2822654dcd90ed

    • SSDEEP

      49152:bM8kreqST3gNH92gVmc//////ZTVJ50BSRc0OlYouOP8GPhLZB:se53gNH92gVmc///////J5pW0Qui8GPt

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks