General

  • Target

    65ca10479fc6ee6d8f9a276878a5313b4145776c505e7d23e8716c42f740fc4a

  • Size

    2.2MB

  • Sample

    240925-va8s3ayhpe

  • MD5

    f0e2f2f26ef1e2b99b56f27651f72330

  • SHA1

    92e2b5467a0c9af9579c3f0c9448d5b2daa0b5b5

  • SHA256

    65ca10479fc6ee6d8f9a276878a5313b4145776c505e7d23e8716c42f740fc4a

  • SHA512

    9b5a0ffd86e36c510a3f8f0b9263431cf8d4adf1fa3abcb66c4c2ee60ebbd22806e738c02711d4685c56276db895390cfcee59e8a2ecfeff19afe5fcf90cb969

  • SSDEEP

    49152:jQZAdVyVT9n/Gg0P+WhowZPItx2apeapelI:EGdVyVT9nOgmhStUvlI

Malware Config

Targets

    • Target

      65ca10479fc6ee6d8f9a276878a5313b4145776c505e7d23e8716c42f740fc4a

    • Size

      2.2MB

    • MD5

      f0e2f2f26ef1e2b99b56f27651f72330

    • SHA1

      92e2b5467a0c9af9579c3f0c9448d5b2daa0b5b5

    • SHA256

      65ca10479fc6ee6d8f9a276878a5313b4145776c505e7d23e8716c42f740fc4a

    • SHA512

      9b5a0ffd86e36c510a3f8f0b9263431cf8d4adf1fa3abcb66c4c2ee60ebbd22806e738c02711d4685c56276db895390cfcee59e8a2ecfeff19afe5fcf90cb969

    • SSDEEP

      49152:jQZAdVyVT9n/Gg0P+WhowZPItx2apeapelI:EGdVyVT9nOgmhStUvlI

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks