General

  • Target

    Sample(s).rar

  • Size

    25.3MB

  • Sample

    241010-slj8qssaph

  • MD5

    8e82833830e0465c007040b11ecb5fe0

  • SHA1

    868000cbaec4e8f390dd9705716afc1e7f3feab7

  • SHA256

    a0efb0165935acc802cfc2da23b50a7867ad7f740d747d08127fa27fa8280775

  • SHA512

    553e5c395e14a2248e5df34ac78ad027744189fb5a1fdfe1810443f17fb29d2bc701cfae875c2c1b49de2787d3803d3925229784d1a46bee5c159089664dcb11

  • SSDEEP

    393216:kEh6/OwK82CK5X4TyBThBizlXtgqxZ0HYr20UOs2Rs23yOy3scmEuD:th6bKrCK5ImT/wngWOwrs2u2+8cmD

Malware Config

Targets

    • Target

      wtepktomp.exe.v

    • Size

      27.6MB

    • MD5

      4ce843f56cbad3ab43caec3ba7f6071d

    • SHA1

      999ecf6203235a3efc3ffa2d599ac4b4ad3e3c2a

    • SHA256

      ae783b3c7bcb5ea06fb5eb671da35cbab84fed9ce035c3a322733f409d1dbebe

    • SHA512

      fc5992edb859c064a31128dc227158d79d29446d1036c453513e01ba201364b20be118243a36fffdd3deb8f3ec1da85a0896edc99e2de9e4dcdeaf49131e5b96

    • SSDEEP

      786432:Dwn4l5mSUNsSjeNes2B2q8H9MNEjHzb141qwHX:DNfm/fUedZwXD0qA

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks