General

  • Target

    3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234

  • Size

    12.0MB

  • Sample

    241103-szr6haxemd

  • MD5

    9e2fa902bb8be71f58f6c98bb8fa7838

  • SHA1

    f6ab4f05204fa2eca061397e129734c356c2576f

  • SHA256

    3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234

  • SHA512

    c66944eade0935bae33cc87e061fefa94ef88bcd9d9a3b5cf913d4745462f2faa1976f5223f60bb4381de1dc45b74c84c34441c6661254661950a2a3ed97bf67

  • SSDEEP

    196608:NWT9nO7j4adWhxSd/FUpoWyKAozKY4TPLKAouKn:v7jjdWxu/mpodKACXCzKATY

Malware Config

Targets

    • Target

      3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234

    • Size

      12.0MB

    • MD5

      9e2fa902bb8be71f58f6c98bb8fa7838

    • SHA1

      f6ab4f05204fa2eca061397e129734c356c2576f

    • SHA256

      3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234

    • SHA512

      c66944eade0935bae33cc87e061fefa94ef88bcd9d9a3b5cf913d4745462f2faa1976f5223f60bb4381de1dc45b74c84c34441c6661254661950a2a3ed97bf67

    • SSDEEP

      196608:NWT9nO7j4adWhxSd/FUpoWyKAozKY4TPLKAouKn:v7jjdWxu/mpodKACXCzKATY

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks