General

  • Target

    5edede4eeec1a61e92d6c07df5dc64d68f0b618f2c7f23a625e14a3fee5b163b

  • Size

    13.0MB

  • Sample

    240525-wtke9ade47

  • MD5

    47c9fb12214063f8ad047b610c5a0b23

  • SHA1

    2f8dbb1afcbc34990c00e4287b719818df13f55a

  • SHA256

    5edede4eeec1a61e92d6c07df5dc64d68f0b618f2c7f23a625e14a3fee5b163b

  • SHA512

    abe197fb25efeb8f7058c0e0fc23dea1e09de546aa1a2a7587aa00dc7b0b687c3f1f228eee44f840fac36c7350e898db1c95839e0fc5582386f480752b2b659f

  • SSDEEP

    196608:TKXbeO75kwEI3CcdEsnSi4bLq3mEHdmJVgkO:47oI1EsSi4CmEHdme

Malware Config

Targets

    • Target

      5edede4eeec1a61e92d6c07df5dc64d68f0b618f2c7f23a625e14a3fee5b163b

    • Size

      13.0MB

    • MD5

      47c9fb12214063f8ad047b610c5a0b23

    • SHA1

      2f8dbb1afcbc34990c00e4287b719818df13f55a

    • SHA256

      5edede4eeec1a61e92d6c07df5dc64d68f0b618f2c7f23a625e14a3fee5b163b

    • SHA512

      abe197fb25efeb8f7058c0e0fc23dea1e09de546aa1a2a7587aa00dc7b0b687c3f1f228eee44f840fac36c7350e898db1c95839e0fc5582386f480752b2b659f

    • SSDEEP

      196608:TKXbeO75kwEI3CcdEsnSi4bLq3mEHdmJVgkO:47oI1EsSi4CmEHdme

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks