General

  • Target

    128f7255bb3536fe1f86d4205727496c4b4642c116bda3fd13670196f12624fb

  • Size

    2.9MB

  • Sample

    241028-23vkgazbrr

  • MD5

    e63cb50c7b2b5143fc2511c54328a6f5

  • SHA1

    55bfb18615431f2047d289c26b6eccfdfb6c7e08

  • SHA256

    128f7255bb3536fe1f86d4205727496c4b4642c116bda3fd13670196f12624fb

  • SHA512

    0347b6c97b01685db6b3ee4a5b47a4a7b524d198248aee118f1044a810ed0c81fac44e48ae820fcf4fc3eb435b77c779c929bce35cb3fb80811cb5eee40a3092

  • SSDEEP

    49152:FQZAdVyVT9n/Gg0P+WhoDtGae84r0XXDncjMUf2eVh+kf5lQXdtK:eGdVyVT9nOgmhItGaeOc0enatK

Malware Config

Targets

    • Target

      128f7255bb3536fe1f86d4205727496c4b4642c116bda3fd13670196f12624fb

    • Size

      2.9MB

    • MD5

      e63cb50c7b2b5143fc2511c54328a6f5

    • SHA1

      55bfb18615431f2047d289c26b6eccfdfb6c7e08

    • SHA256

      128f7255bb3536fe1f86d4205727496c4b4642c116bda3fd13670196f12624fb

    • SHA512

      0347b6c97b01685db6b3ee4a5b47a4a7b524d198248aee118f1044a810ed0c81fac44e48ae820fcf4fc3eb435b77c779c929bce35cb3fb80811cb5eee40a3092

    • SSDEEP

      49152:FQZAdVyVT9n/Gg0P+WhoDtGae84r0XXDncjMUf2eVh+kf5lQXdtK:eGdVyVT9nOgmhItGaeOc0enatK

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks