General

  • Target

    92706226587c195f722a80225ef74df9d5ff03a7a9c9a4f6a9c5e4f4bb95ea64

  • Size

    3.6MB

  • Sample

    240927-fkva4awdnp

  • MD5

    688ce04af7db2c86384bb19179711983

  • SHA1

    94721c80d777fde977e2b21e74f726b293594d54

  • SHA256

    92706226587c195f722a80225ef74df9d5ff03a7a9c9a4f6a9c5e4f4bb95ea64

  • SHA512

    d50022b9a7c348994dfbb94cb6006ff3b2e2fd9510105298a28981ff4000f959c743516bc9cca71a9f4eefa431d0c0d06249c57299aad4d48a063ce94c2cb375

  • SSDEEP

    49152:sCwsbCANnKXferL7Vwe/Gg0P+WhYxsS78aNKNexjikTt0V:/ws2ANnKXOaeOgmhqsS78+KNexji/

Malware Config

Targets

    • Target

      92706226587c195f722a80225ef74df9d5ff03a7a9c9a4f6a9c5e4f4bb95ea64

    • Size

      3.6MB

    • MD5

      688ce04af7db2c86384bb19179711983

    • SHA1

      94721c80d777fde977e2b21e74f726b293594d54

    • SHA256

      92706226587c195f722a80225ef74df9d5ff03a7a9c9a4f6a9c5e4f4bb95ea64

    • SHA512

      d50022b9a7c348994dfbb94cb6006ff3b2e2fd9510105298a28981ff4000f959c743516bc9cca71a9f4eefa431d0c0d06249c57299aad4d48a063ce94c2cb375

    • SSDEEP

      49152:sCwsbCANnKXferL7Vwe/Gg0P+WhYxsS78aNKNexjikTt0V:/ws2ANnKXOaeOgmhqsS78+KNexji/

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks