Dirtymoe (Purplefox) Affected More Than 2000 Computers in Ukraine
Summary: Suggested Corrections: HKEY_LOCAL_MACHINE\System\ControlSet001\services\MsXXXXXXXXXApp C:\Windows\System32\MsXXXXXXXXXApp.dll C:\Windows\AppPatch\DBXXXXXXMK.sdb C:\Windows\AppPatch\RCXXXXXXXXXMS.sdb C:\Windows\AppPatch\TKXXXXXXXXXMS.sdb Additionally, the linked resources includes IOCS, and ways companies can search for and remove the malicious programs.
The Government Computer Emergency Response Team of Ukraine (CERT-UA) took action under the law to assist a state-owned enterprise facing significant damage from the DIRTYMOE (PURPLEFOX) malicious program, affecting over 2,000 computers in the Ukrainian internet segment. Analysis of malware samples and reference to reports from Avast and Trendmicro aided in understanding the threat's intricacies. The Technical Information section provides details for handling the issue, emphasizing the importance of segregating outdated systems and implementing filtering measures.
Security Officer Comments:
DIRTYMOE, a known modular malware, enables remote access, primarily for DDoS attacks and mining, and uses a rootkit for persistent presence. It spreads through popular software with an MSI installer and employs various methods for self-propagation, exploiting vulnerabilities and using obfuscated IP addresses. The management infrastructure's fault tolerance involves multiple communication methods. During a monitoring period in January 2024, 486 intermediate control servers were identified, mostly in compromised equipment located in China, with around 20 new IP addresses added daily. The ongoing activity is tracked by the identifier UAC-0027, and entities are urged to eliminate the cyber threat based on CERT-UA-provided information available here:
To search for signs of damage:
Link(s):
https://cert.gov.ua/article/6277422