General

  • Target

    tmp

  • Size

    3KB

  • Sample

    230529-zkvreadh5y

  • MD5

    2c852975cace6f2b5f718ae4e4b5045a

  • SHA1

    eb93148e9d8d99838a7931f7c2f35dd6079c139e

  • SHA256

    1c2d6cf4a4c13c5a55812508c2649d6ae23138565e0e5d6fb56f6e7407b6bb71

  • SHA512

    27cac97afd2c126f6162051377fa9cef22c90bd68453a71bdbb2bbc76613af0fec49dc7863f7e308984d69ce82fc9e07f8ac1ec4609478435f98618cafacdffe

Malware Config

Targets

    • Target

      tmp

    • Size

      3KB

    • MD5

      2c852975cace6f2b5f718ae4e4b5045a

    • SHA1

      eb93148e9d8d99838a7931f7c2f35dd6079c139e

    • SHA256

      1c2d6cf4a4c13c5a55812508c2649d6ae23138565e0e5d6fb56f6e7407b6bb71

    • SHA512

      27cac97afd2c126f6162051377fa9cef22c90bd68453a71bdbb2bbc76613af0fec49dc7863f7e308984d69ce82fc9e07f8ac1ec4609478435f98618cafacdffe

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Tasks