General

  • Target

    33c30a0f35039f97c380ea2011320be3cbd648501772bd19a404e24c3afdc35f

  • Size

    4.7MB

  • Sample

    240525-qw4c9aec9w

  • MD5

    e153c0ba5198e4b7279608346bcadae8

  • SHA1

    cdc3544034d76455ae9a557fe37d8be031354eb0

  • SHA256

    33c30a0f35039f97c380ea2011320be3cbd648501772bd19a404e24c3afdc35f

  • SHA512

    fb5f3ecfff00960257f520968525aeb880bdae92df86eb2ef2134706d2beba3964eaeab24bc6eb91d7600f368d3bf5f7a175bd0c6e49105989af05394ba89d80

  • SSDEEP

    49152:V89XJt4HIZ/Gg0P+Whmd5bXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8b8R:SZJt4HIZOgmhmd5bXsPN5kiQaZ56

Malware Config

Targets

    • Target

      33c30a0f35039f97c380ea2011320be3cbd648501772bd19a404e24c3afdc35f

    • Size

      4.7MB

    • MD5

      e153c0ba5198e4b7279608346bcadae8

    • SHA1

      cdc3544034d76455ae9a557fe37d8be031354eb0

    • SHA256

      33c30a0f35039f97c380ea2011320be3cbd648501772bd19a404e24c3afdc35f

    • SHA512

      fb5f3ecfff00960257f520968525aeb880bdae92df86eb2ef2134706d2beba3964eaeab24bc6eb91d7600f368d3bf5f7a175bd0c6e49105989af05394ba89d80

    • SSDEEP

      49152:V89XJt4HIZ/Gg0P+Whmd5bXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8b8R:SZJt4HIZOgmhmd5bXsPN5kiQaZ56

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks