General

  • Target

    74057e0026a76c45b6da0a5abe814dec50b52a5620219a72b4d69244faca2bed

  • Size

    2.0MB

  • Sample

    241103-s2t3wawrfs

  • MD5

    f2de5959af0e1ace5581e125a633cb05

  • SHA1

    3b04d6911d69ddc2ff9840c5fd9d442a22ac1391

  • SHA256

    74057e0026a76c45b6da0a5abe814dec50b52a5620219a72b4d69244faca2bed

  • SHA512

    a36223e9b0f15c7217e9cef0e71f1d34c156b536ff19d800ea9cc5cc227055d76dd96d3af723c929d57a6633e3a6b0217d6f602a1b4c664b27fe68a29a2b006c

  • SSDEEP

    49152:AQZAdVyVT9n/Gg0P+WhoopePnf6zqgmnpeapeT:JGdVyVT9nOgmhaPieQvT

Malware Config

Targets

    • Target

      74057e0026a76c45b6da0a5abe814dec50b52a5620219a72b4d69244faca2bed

    • Size

      2.0MB

    • MD5

      f2de5959af0e1ace5581e125a633cb05

    • SHA1

      3b04d6911d69ddc2ff9840c5fd9d442a22ac1391

    • SHA256

      74057e0026a76c45b6da0a5abe814dec50b52a5620219a72b4d69244faca2bed

    • SHA512

      a36223e9b0f15c7217e9cef0e71f1d34c156b536ff19d800ea9cc5cc227055d76dd96d3af723c929d57a6633e3a6b0217d6f602a1b4c664b27fe68a29a2b006c

    • SSDEEP

      49152:AQZAdVyVT9n/Gg0P+WhoopePnf6zqgmnpeapeT:JGdVyVT9nOgmhaPieQvT

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks