General

  • Target

    e2a3657c7a2621e1be036e7c0f5ce4a15ad398cea685f93fdde06ee5fdbe20d6

  • Size

    2.5MB

  • Sample

    240927-h96rjavaqd

  • MD5

    1fe8540ce0db398a195e5fd2d6542607

  • SHA1

    1c1102e58a3bc34140f8b7f0298b5c941bafef8a

  • SHA256

    e2a3657c7a2621e1be036e7c0f5ce4a15ad398cea685f93fdde06ee5fdbe20d6

  • SHA512

    e67f7de632a9d1a5fac4b6a3cdde415e6343d2b2198bbacd3e0f05277875d7fdd736324f41c567a7f35385caf645722d5f090c0d591824cc694e3cd0909a9a89

  • SSDEEP

    24576:DCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHK:DCwsbCANnKXferL7Vwe/Gg0P+WhBT

Malware Config

Targets

    • Target

      e2a3657c7a2621e1be036e7c0f5ce4a15ad398cea685f93fdde06ee5fdbe20d6

    • Size

      2.5MB

    • MD5

      1fe8540ce0db398a195e5fd2d6542607

    • SHA1

      1c1102e58a3bc34140f8b7f0298b5c941bafef8a

    • SHA256

      e2a3657c7a2621e1be036e7c0f5ce4a15ad398cea685f93fdde06ee5fdbe20d6

    • SHA512

      e67f7de632a9d1a5fac4b6a3cdde415e6343d2b2198bbacd3e0f05277875d7fdd736324f41c567a7f35385caf645722d5f090c0d591824cc694e3cd0909a9a89

    • SSDEEP

      24576:DCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHK:DCwsbCANnKXferL7Vwe/Gg0P+WhBT

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks