General

  • Target

    4c953a516105943a841c973a711b6cbd38182947817ea7a65eb8a2a74da517f9

  • Size

    2.5MB

  • Sample

    240526-f4hfmsge2v

  • MD5

    baed71cd06f5268adda4a5ea69862a7a

  • SHA1

    814a5ccb182bb4e9cad13fd3fa46486c34f1db07

  • SHA256

    4c953a516105943a841c973a711b6cbd38182947817ea7a65eb8a2a74da517f9

  • SHA512

    149cfe0354aafd8526318a82bae974ba3abe6b08770ccbcdd6cddacc2a11ae636b97adea03435f044a6c8e5007b9de92a512c2cd4777d44ecb2b09db37d41359

  • SSDEEP

    24576:4CwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHY:4CwsbCANnKXferL7Vwe/Gg0P+Wh1EI

Malware Config

Targets

    • Target

      4c953a516105943a841c973a711b6cbd38182947817ea7a65eb8a2a74da517f9

    • Size

      2.5MB

    • MD5

      baed71cd06f5268adda4a5ea69862a7a

    • SHA1

      814a5ccb182bb4e9cad13fd3fa46486c34f1db07

    • SHA256

      4c953a516105943a841c973a711b6cbd38182947817ea7a65eb8a2a74da517f9

    • SHA512

      149cfe0354aafd8526318a82bae974ba3abe6b08770ccbcdd6cddacc2a11ae636b97adea03435f044a6c8e5007b9de92a512c2cd4777d44ecb2b09db37d41359

    • SSDEEP

      24576:4CwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHY:4CwsbCANnKXferL7Vwe/Gg0P+Wh1EI

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks