General

  • Target

    ad8c2f6379ef461b2e6b21bfa1a2d5ef3b5dde27ac85ad95249a1396c5bceb31

  • Size

    2.6MB

  • Sample

    240526-hj5rjsad4w

  • MD5

    b4553e0afe7e7d7ece186cd54c7ca513

  • SHA1

    a3da175d1977924b017e35a14ffbdbb253011822

  • SHA256

    ad8c2f6379ef461b2e6b21bfa1a2d5ef3b5dde27ac85ad95249a1396c5bceb31

  • SHA512

    1e36a323f0ac40f6769578b4eb66eb505b80306d973d0cdffdd644db5b10871c36ee8413ef88e684cdb0f898f2dca01f4a440d67a1a9cb146e6a1a1e48712337

  • SSDEEP

    49152:L09XJt4HIN2H2tFvduySIwypXTrcU0V2mkjSPfRpFmPgHvjD:4ZJt4HINy2LkyXv0PfRpFmUn

Malware Config

Targets

    • Target

      ad8c2f6379ef461b2e6b21bfa1a2d5ef3b5dde27ac85ad95249a1396c5bceb31

    • Size

      2.6MB

    • MD5

      b4553e0afe7e7d7ece186cd54c7ca513

    • SHA1

      a3da175d1977924b017e35a14ffbdbb253011822

    • SHA256

      ad8c2f6379ef461b2e6b21bfa1a2d5ef3b5dde27ac85ad95249a1396c5bceb31

    • SHA512

      1e36a323f0ac40f6769578b4eb66eb505b80306d973d0cdffdd644db5b10871c36ee8413ef88e684cdb0f898f2dca01f4a440d67a1a9cb146e6a1a1e48712337

    • SSDEEP

      49152:L09XJt4HIN2H2tFvduySIwypXTrcU0V2mkjSPfRpFmPgHvjD:4ZJt4HINy2LkyXv0PfRpFmUn

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks