General

  • Target

    504780d9c960217ca3d8298ba419646e84fcf11095efa64f487cd2db41a2d022

  • Size

    11.5MB

  • Sample

    240526-en3wzaed3v

  • MD5

    e98f328d7ebacecf61ff1114c73fb41f

  • SHA1

    3e6cc9f5fe9d69c55d64b0e66a7bfe3b809837ab

  • SHA256

    504780d9c960217ca3d8298ba419646e84fcf11095efa64f487cd2db41a2d022

  • SHA512

    ba524598a48f232800ca3ab0533f28ee2951226accbc0ad63b1912b4d51823657491d6c6d079b943c4a41dd0f01ce4ef3154dace8ad84d9c024324ef028751a0

  • SSDEEP

    98304:lZJt4HINy2Lk/tfWgLC1W7+poaF6Z4kum1C59XFjZEfqtfu:niINy2Lk/tfDL6W61FY4k6Yfqtfu

Malware Config

Targets

    • Target

      504780d9c960217ca3d8298ba419646e84fcf11095efa64f487cd2db41a2d022

    • Size

      11.5MB

    • MD5

      e98f328d7ebacecf61ff1114c73fb41f

    • SHA1

      3e6cc9f5fe9d69c55d64b0e66a7bfe3b809837ab

    • SHA256

      504780d9c960217ca3d8298ba419646e84fcf11095efa64f487cd2db41a2d022

    • SHA512

      ba524598a48f232800ca3ab0533f28ee2951226accbc0ad63b1912b4d51823657491d6c6d079b943c4a41dd0f01ce4ef3154dace8ad84d9c024324ef028751a0

    • SSDEEP

      98304:lZJt4HINy2Lk/tfWgLC1W7+poaF6Z4kum1C59XFjZEfqtfu:niINy2Lk/tfDL6W61FY4k6Yfqtfu

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks