General

  • Target

    e32e28efdfdcefa27d99d0f929f045805bbc87068ee394e5cc28b9e3b99e8833

  • Size

    1.2MB

  • Sample

    241118-xrktnssqbw

  • MD5

    ae9f35664f1a2bc8c1eb49295420f566

  • SHA1

    e7f93eef0acf6a4344646554d0e90a3f3272cc57

  • SHA256

    e32e28efdfdcefa27d99d0f929f045805bbc87068ee394e5cc28b9e3b99e8833

  • SHA512

    b2442e26352e07cb70361d2596792139c2114bd1eb4a9ad2e624a993a25b4043cc0174601dd3084feb3d1c480ad2d4fdfcdbac3bf6784f17c74002d9b00c8ca4

  • SSDEEP

    24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtir:WIwgMEuy+inDfp3/XoCw57XYBwKr

Malware Config

Targets

    • Target

      e32e28efdfdcefa27d99d0f929f045805bbc87068ee394e5cc28b9e3b99e8833

    • Size

      1.2MB

    • MD5

      ae9f35664f1a2bc8c1eb49295420f566

    • SHA1

      e7f93eef0acf6a4344646554d0e90a3f3272cc57

    • SHA256

      e32e28efdfdcefa27d99d0f929f045805bbc87068ee394e5cc28b9e3b99e8833

    • SHA512

      b2442e26352e07cb70361d2596792139c2114bd1eb4a9ad2e624a993a25b4043cc0174601dd3084feb3d1c480ad2d4fdfcdbac3bf6784f17c74002d9b00c8ca4

    • SSDEEP

      24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtir:WIwgMEuy+inDfp3/XoCw57XYBwKr

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks