General

  • Target

    eb3c40aea6ce5542af11670a08b9bce21b652ff7fa6b73fbd9f361b038a5dc5a

  • Size

    4.0MB

  • Sample

    240526-k21xesdb81

  • MD5

    26ab20d3e942f001d81bd36f07de22da

  • SHA1

    325ffa56879fc6aeb4aac3ee5fae414ce4f749f4

  • SHA256

    eb3c40aea6ce5542af11670a08b9bce21b652ff7fa6b73fbd9f361b038a5dc5a

  • SHA512

    4906b7c3f0366548756f44c3a26c86e05ab82267f7d35c3420ce637f90636fbf4339b0ec3cdaf3b34aa862e569559dc18bedb7124381c7b8a9143c00865e13a3

  • SSDEEP

    49152:GCwsbCANnKXferL7Vwe/Gg0P+WhWsNw4M6l0xhcO35JpJ9c43ujmFVdqLB3Me:xws2ANnKXOaeOgmhWxv6l0xhz3wmY

Malware Config

Targets

    • Target

      eb3c40aea6ce5542af11670a08b9bce21b652ff7fa6b73fbd9f361b038a5dc5a

    • Size

      4.0MB

    • MD5

      26ab20d3e942f001d81bd36f07de22da

    • SHA1

      325ffa56879fc6aeb4aac3ee5fae414ce4f749f4

    • SHA256

      eb3c40aea6ce5542af11670a08b9bce21b652ff7fa6b73fbd9f361b038a5dc5a

    • SHA512

      4906b7c3f0366548756f44c3a26c86e05ab82267f7d35c3420ce637f90636fbf4339b0ec3cdaf3b34aa862e569559dc18bedb7124381c7b8a9143c00865e13a3

    • SSDEEP

      49152:GCwsbCANnKXferL7Vwe/Gg0P+WhWsNw4M6l0xhcO35JpJ9c43ujmFVdqLB3Me:xws2ANnKXOaeOgmhWxv6l0xhz3wmY

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Drops file in Drivers directory

    • Sets DLL path for service in the registry

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks