General

  • Target

    210cdd7c069f732be2f284ca9081c98b9ecd36f5646640c95306aaf0e125e2ed

  • Size

    2.3MB

  • Sample

    241012-bh5a3aydrn

  • MD5

    99a7669bf51718b382ae32f45cf701de

  • SHA1

    e700a0b377e2ce68fb3895bb9667b5af988646e1

  • SHA256

    210cdd7c069f732be2f284ca9081c98b9ecd36f5646640c95306aaf0e125e2ed

  • SHA512

    1376de4735de8ae8ac61c5fd23682573cc7fea7c0e63ff159d128fea5ffdd60c19247fa80acdf9e0f7fed18b9b2aebf06d758b558ddf3088dc2248934a7a6348

  • SSDEEP

    24576:hCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHW:hCwsbCANnKXferL7Vwe/Gg0P+Wh0Q

Malware Config

Targets

    • Target

      210cdd7c069f732be2f284ca9081c98b9ecd36f5646640c95306aaf0e125e2ed

    • Size

      2.3MB

    • MD5

      99a7669bf51718b382ae32f45cf701de

    • SHA1

      e700a0b377e2ce68fb3895bb9667b5af988646e1

    • SHA256

      210cdd7c069f732be2f284ca9081c98b9ecd36f5646640c95306aaf0e125e2ed

    • SHA512

      1376de4735de8ae8ac61c5fd23682573cc7fea7c0e63ff159d128fea5ffdd60c19247fa80acdf9e0f7fed18b9b2aebf06d758b558ddf3088dc2248934a7a6348

    • SSDEEP

      24576:hCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHW:hCwsbCANnKXferL7Vwe/Gg0P+Wh0Q

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks