General

  • Target

    d645185fa8fbe338f26ad26972aec46c24e826556e229c059b6adb2669200fe8.exe

  • Size

    27.6MB

  • Sample

    250123-gzw9nsxnfr

  • MD5

    dba779040cc9cf606ae3271ec9ef03d0

  • SHA1

    00cd24e75cd21e44c14bc4602df189d34c2b14b2

  • SHA256

    d645185fa8fbe338f26ad26972aec46c24e826556e229c059b6adb2669200fe8

  • SHA512

    427986dd32cd9ea42ee7da6eb8227ab939833f76a7d796d97b8ed213be3ed3e38dc75c0f332f50864eb972bf3af065f930acbafab8394098b9cd2d0f8158319f

  • SSDEEP

    786432:wbnq//o4Syaf/A7NpfYoLzxCYjTF5wdbzo5p6VmTs1TW5lhH:z//nk8JjxCKSI5p6kTsJW5H

Malware Config

Targets

    • Target

      d645185fa8fbe338f26ad26972aec46c24e826556e229c059b6adb2669200fe8.exe

    • Size

      27.6MB

    • MD5

      dba779040cc9cf606ae3271ec9ef03d0

    • SHA1

      00cd24e75cd21e44c14bc4602df189d34c2b14b2

    • SHA256

      d645185fa8fbe338f26ad26972aec46c24e826556e229c059b6adb2669200fe8

    • SHA512

      427986dd32cd9ea42ee7da6eb8227ab939833f76a7d796d97b8ed213be3ed3e38dc75c0f332f50864eb972bf3af065f930acbafab8394098b9cd2d0f8158319f

    • SSDEEP

      786432:wbnq//o4Syaf/A7NpfYoLzxCYjTF5wdbzo5p6VmTs1TW5lhH:z//nk8JjxCKSI5p6kTsJW5H

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks