General

  • Target

    dca770bb219c12038d432eb278675b8d032777cf41962fd44a17b9957d0d360a

  • Size

    1.2MB

  • Sample

    241118-gmtm1szlgt

  • MD5

    1e476061065cda00dbb1d4f9a94bcf29

  • SHA1

    654be4c1571d773a8999c72d38b1afa27b7cf68d

  • SHA256

    dca770bb219c12038d432eb278675b8d032777cf41962fd44a17b9957d0d360a

  • SHA512

    2bd436eb9e899e53bba81fab998e881a135f89de92502e0ed2d7aeb444d0de6054e09a9bd471936f6b3eb4113536b80b7c22fd720227a29ec0e36b73b2f62f99

  • SSDEEP

    24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiD:WIwgMEuy+inDfp3/XoCw57XYBwKD

Malware Config

Targets

    • Target

      dca770bb219c12038d432eb278675b8d032777cf41962fd44a17b9957d0d360a

    • Size

      1.2MB

    • MD5

      1e476061065cda00dbb1d4f9a94bcf29

    • SHA1

      654be4c1571d773a8999c72d38b1afa27b7cf68d

    • SHA256

      dca770bb219c12038d432eb278675b8d032777cf41962fd44a17b9957d0d360a

    • SHA512

      2bd436eb9e899e53bba81fab998e881a135f89de92502e0ed2d7aeb444d0de6054e09a9bd471936f6b3eb4113536b80b7c22fd720227a29ec0e36b73b2f62f99

    • SSDEEP

      24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtiD:WIwgMEuy+inDfp3/XoCw57XYBwKD

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks