General

  • Target

    aa98ff6a8ef5dfa52b6c2b45bc08b1ee2c4a64e14b9651ed8f068e3ae910c683

  • Size

    4.4MB

  • Sample

    241012-sn6vhsxbjh

  • MD5

    be678db8a1b0119b2c41c4e92149a9a2

  • SHA1

    df43bc7dd57e1ea06f5048f1fc0dc6948141d3bd

  • SHA256

    aa98ff6a8ef5dfa52b6c2b45bc08b1ee2c4a64e14b9651ed8f068e3ae910c683

  • SHA512

    083f58031dced3423d89cfdf4eb21565308d47ae54452b2b0eeff0c721f2fd351d2782dcf087743a793011c65d7e259cc315dc78da4ad85eee6b1f292f5cd48a

  • SSDEEP

    98304:Po8WASAsclWSV7SxyqxrAsclWSV7Sxyqxr7:PoTDTeaTea7

Malware Config

Targets

    • Target

      aa98ff6a8ef5dfa52b6c2b45bc08b1ee2c4a64e14b9651ed8f068e3ae910c683

    • Size

      4.4MB

    • MD5

      be678db8a1b0119b2c41c4e92149a9a2

    • SHA1

      df43bc7dd57e1ea06f5048f1fc0dc6948141d3bd

    • SHA256

      aa98ff6a8ef5dfa52b6c2b45bc08b1ee2c4a64e14b9651ed8f068e3ae910c683

    • SHA512

      083f58031dced3423d89cfdf4eb21565308d47ae54452b2b0eeff0c721f2fd351d2782dcf087743a793011c65d7e259cc315dc78da4ad85eee6b1f292f5cd48a

    • SSDEEP

      98304:Po8WASAsclWSV7SxyqxrAsclWSV7Sxyqxr7:PoTDTeaTea7

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks