Behavioral task
behavioral1
Sample
2276-7-0x0000000000400000-0x000000000233B000-memory.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2276-7-0x0000000000400000-0x000000000233B000-memory.exe
Resource
win10v2004-20240426-en
General
-
Target
2276-7-0x0000000000400000-0x000000000233B000-memory.dmp
-
Size
31.2MB
-
MD5
7a9949698794f03cd2b3361b8325af59
-
SHA1
a704348510472392e565a722c3d52996d60df8dd
-
SHA256
94ccd38497eb752e75e752208e94b81adfc6504203ab47bf2e9f51e880161398
-
SHA512
bc8db923203288267b4cbc351d2d3aa043cb7d6d295ce94d14a37b9b85632cef67fd86aecde89bc871b6779a29e7c8c4fdec54ce6b2c458f8979274f92b6f7fb
-
SSDEEP
196608:m0j2VCjP3Gx0GaN+hn0u50iIoysG+Xcni0iYvr00E5GqJd5igOcSWUOMzn0O1koV:6mGxrz0utIoLv520IiBOcSWUOMr0Klz
Malware Config
Extracted
gh0strat
hfs666.top
Signatures
-
resource yara_rule sample purplefox_rootkit -
Gh0st RAT payload 1 IoCs
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Purplefox family
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2276-7-0x0000000000400000-0x000000000233B000-memory.dmp
Files
-
2276-7-0x0000000000400000-0x000000000233B000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 15.8MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 452KB - Virtual size: 456KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 15.0MB - Virtual size: 15.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE