General

  • Target

    cec838f58787f19fe780be424574627bcb44ec5041f89a40b7ce1a8593444106

  • Size

    6.1MB

  • Sample

    241228-s7wtnazler

  • MD5

    ee7de747667128693a1de237bdc6830c

  • SHA1

    c87b0ee4f17da9cb81e8c4f610ebe9a438d9acae

  • SHA256

    cec838f58787f19fe780be424574627bcb44ec5041f89a40b7ce1a8593444106

  • SHA512

    073dadc95cbe111658e57343328fa9b3821b676d5b62a16f898603d020a5525dfe099cb41769c6058ab2473111834541a9a1f5013545eb518f93687269c97b52

  • SSDEEP

    98304:pws2ANnKXOaeOgmhI1BTuOZ+zSL6E9NkSy38jWLMMMyziqcrX6G5ijWAKJSQktZw:bKXbeO7S1pHwOWCkPzXeqE3ijWpH

Malware Config

Targets

    • Target

      cec838f58787f19fe780be424574627bcb44ec5041f89a40b7ce1a8593444106

    • Size

      6.1MB

    • MD5

      ee7de747667128693a1de237bdc6830c

    • SHA1

      c87b0ee4f17da9cb81e8c4f610ebe9a438d9acae

    • SHA256

      cec838f58787f19fe780be424574627bcb44ec5041f89a40b7ce1a8593444106

    • SHA512

      073dadc95cbe111658e57343328fa9b3821b676d5b62a16f898603d020a5525dfe099cb41769c6058ab2473111834541a9a1f5013545eb518f93687269c97b52

    • SSDEEP

      98304:pws2ANnKXOaeOgmhI1BTuOZ+zSL6E9NkSy38jWLMMMyziqcrX6G5ijWAKJSQktZw:bKXbeO7S1pHwOWCkPzXeqE3ijWpH

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks