General

  • Target

    92689e923a85468908e21820f3775521ac2d30ce0c0c4b6379a4febc9ea1eb48

  • Size

    1.2MB

  • Sample

    250105-hbx2qsxqan

  • MD5

    58b978f0ba670a61bfd282963a6c7e2c

  • SHA1

    d40ad691d9ce60f8093cf5a74d3d06aa17d9e26d

  • SHA256

    92689e923a85468908e21820f3775521ac2d30ce0c0c4b6379a4febc9ea1eb48

  • SHA512

    ae9d408ca37db7e75ff722643d59b80149fb9960972c697074c78340bbd1d19b263df4727f32c04eeb264145934db2fd6787d12ac2c2a8d07615c8bdffe809be

  • SSDEEP

    24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtia:WIwgMEuy+inDfp3/XoCw57XYBwKa

Malware Config

Targets

    • Target

      92689e923a85468908e21820f3775521ac2d30ce0c0c4b6379a4febc9ea1eb48

    • Size

      1.2MB

    • MD5

      58b978f0ba670a61bfd282963a6c7e2c

    • SHA1

      d40ad691d9ce60f8093cf5a74d3d06aa17d9e26d

    • SHA256

      92689e923a85468908e21820f3775521ac2d30ce0c0c4b6379a4febc9ea1eb48

    • SHA512

      ae9d408ca37db7e75ff722643d59b80149fb9960972c697074c78340bbd1d19b263df4727f32c04eeb264145934db2fd6787d12ac2c2a8d07615c8bdffe809be

    • SSDEEP

      24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJtia:WIwgMEuy+inDfp3/XoCw57XYBwKa

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks