General

  • Target

    0d453d23f76b955dabcc7a19fed38ae984c1c50e981c3cc30f62b700088b9061

  • Size

    5.6MB

  • Sample

    240525-yckqssff9x

  • MD5

    6a508bd837555358782172d9b44e0d95

  • SHA1

    f3320eba0a227e64cab1cdf5005ec06fcd812918

  • SHA256

    0d453d23f76b955dabcc7a19fed38ae984c1c50e981c3cc30f62b700088b9061

  • SHA512

    d454ca9c76d371b9dc094df66fb455a34e45092ef3ae87f988fbae2d0dc3a2e644e8a40c0a035a29c4dd72f73307884a7dc95e200333ea2729398f00279809f1

  • SSDEEP

    98304:tZJt4HINy2LkAi6666666666666666666666666666666x666666666666666fw4:/iINy2LkXMHPXqrwDvxdM91NQsRyUQW

Malware Config

Targets

    • Target

      0d453d23f76b955dabcc7a19fed38ae984c1c50e981c3cc30f62b700088b9061

    • Size

      5.6MB

    • MD5

      6a508bd837555358782172d9b44e0d95

    • SHA1

      f3320eba0a227e64cab1cdf5005ec06fcd812918

    • SHA256

      0d453d23f76b955dabcc7a19fed38ae984c1c50e981c3cc30f62b700088b9061

    • SHA512

      d454ca9c76d371b9dc094df66fb455a34e45092ef3ae87f988fbae2d0dc3a2e644e8a40c0a035a29c4dd72f73307884a7dc95e200333ea2729398f00279809f1

    • SSDEEP

      98304:tZJt4HINy2LkAi6666666666666666666666666666666x666666666666666fw4:/iINy2LkXMHPXqrwDvxdM91NQsRyUQW

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks