General

  • Target

    33eab9c84b74d8074fc3df360e23e99c388bab3048f001b440eb72aca10f6a84

  • Size

    392KB

  • MD5

    4cacbde61af4ec99301b3a5c80880c8e

  • SHA1

    b9b89895438682c9fc51b7f3d07c840ae2e5a7c6

  • SHA256

    33eab9c84b74d8074fc3df360e23e99c388bab3048f001b440eb72aca10f6a84

  • SHA512

    fa7d4ab9f5d2e727440587cac8a0d19f0a5b5da5b0daf8afe32fded36040dd9b03e716680b2fb494a41f00d56ed43dccdb1a637d7eb17fdfac1bbabff30c6535

  • SSDEEP

    6144:Yi+6CCtLgtKPLUgqBhVDGO3qJt5VGDNPaMCGDjgMBMdVRZLE2rB:Yi+MtkAzrqBhtHO5TMCKnGG2rB

Malware Config

Signatures

  • Detect PurpleFox Rootkit 1 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • Purplefox family
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 33eab9c84b74d8074fc3df360e23e99c388bab3048f001b440eb72aca10f6a84
    .dll windows x86


    Headers

    Exports

    Sections

  • out.upx
    .dll windows x86


    Headers

    Sections