General

  • Target

    2a001e735bfdeab1c00157989b998fe02b4fe79329da49c04c9596d28e6c2c87

  • Size

    1.2MB

  • Sample

    250308-x7vnta1px8

  • MD5

    b84a96291caa577032cc16dcdc037d6e

  • SHA1

    186f5b2250728728a7a18b721f0ea279bc55c8c5

  • SHA256

    2a001e735bfdeab1c00157989b998fe02b4fe79329da49c04c9596d28e6c2c87

  • SHA512

    3e49187676c890c4daf01775781a4ffd59a37570bf2d87ad0f22129d819b82bcd569b33b4a3ebb4458a17966e07b7e729ba046b9c8d2b7d6e27a1a1d60e739f1

  • SSDEEP

    24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJti6:WIwgMEuy+inDfp3/XoCw57XYBwK6

Malware Config

Targets

    • Target

      2a001e735bfdeab1c00157989b998fe02b4fe79329da49c04c9596d28e6c2c87

    • Size

      1.2MB

    • MD5

      b84a96291caa577032cc16dcdc037d6e

    • SHA1

      186f5b2250728728a7a18b721f0ea279bc55c8c5

    • SHA256

      2a001e735bfdeab1c00157989b998fe02b4fe79329da49c04c9596d28e6c2c87

    • SHA512

      3e49187676c890c4daf01775781a4ffd59a37570bf2d87ad0f22129d819b82bcd569b33b4a3ebb4458a17966e07b7e729ba046b9c8d2b7d6e27a1a1d60e739f1

    • SSDEEP

      24576:HovxCwgMBqHO5ZdYXOp0nQrXctTfK+d+MrTXowFlw57XYBwJti6:WIwgMEuy+inDfp3/XoCw57XYBwK6

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks