General

  • Target

    579ee17f2fee172447a54a226910e71325ea6880f8fe4fcde47c1e63f7b10f22

  • Size

    2.9MB

  • Sample

    241103-szpqdaxelf

  • MD5

    3f0574e98f7cfde65ab07d764646bd4d

  • SHA1

    4d7190d0ce0f989df325829689e47797290fcef3

  • SHA256

    579ee17f2fee172447a54a226910e71325ea6880f8fe4fcde47c1e63f7b10f22

  • SHA512

    50ee46af9495bb618b23442fc756a2978d5964e2d1ddb281691e7c9372895a9265843ffb779e12bf6e4d87f3be66c64ba4d4574a582593d8147cd5f00dbd4da2

  • SSDEEP

    49152:iQZAdVyVT9n/Gg0P+WhohP+XGwv2tP1zTPADnWPMklKu8bi4O8b8ITDnl13S:7GdVyVT9nOgmhYP+Wwv2tP1PPknK

Malware Config

Targets

    • Target

      579ee17f2fee172447a54a226910e71325ea6880f8fe4fcde47c1e63f7b10f22

    • Size

      2.9MB

    • MD5

      3f0574e98f7cfde65ab07d764646bd4d

    • SHA1

      4d7190d0ce0f989df325829689e47797290fcef3

    • SHA256

      579ee17f2fee172447a54a226910e71325ea6880f8fe4fcde47c1e63f7b10f22

    • SHA512

      50ee46af9495bb618b23442fc756a2978d5964e2d1ddb281691e7c9372895a9265843ffb779e12bf6e4d87f3be66c64ba4d4574a582593d8147cd5f00dbd4da2

    • SSDEEP

      49152:iQZAdVyVT9n/Gg0P+WhohP+XGwv2tP1zTPADnWPMklKu8bi4O8b8ITDnl13S:7GdVyVT9nOgmhYP+Wwv2tP1PPknK

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks