General

  • Target

    3e698acdf72d32b8b824bef22359c965bf0664c6de958b25729f95dbefd0281a

  • Size

    1.5MB

  • Sample

    241103-vf5nlaykds

  • MD5

    b3905c9a0a2e29e54e97d3e8ee168b5e

  • SHA1

    385582ef5cf2123da6398bf2b350a614071b27d3

  • SHA256

    3e698acdf72d32b8b824bef22359c965bf0664c6de958b25729f95dbefd0281a

  • SHA512

    e091a498c6da896abe724b49e0c3d80cbb913e34000488e845acef89896d4e919f933119684a1aa4c038eb892cd0552dcb5f71500b9f9d8b02665bfe5cd816b1

  • SSDEEP

    24576:FQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVcwpeY7oy:FQZAdVyVT9n/Gg0P+WhompeoX

Malware Config

Targets

    • Target

      3e698acdf72d32b8b824bef22359c965bf0664c6de958b25729f95dbefd0281a

    • Size

      1.5MB

    • MD5

      b3905c9a0a2e29e54e97d3e8ee168b5e

    • SHA1

      385582ef5cf2123da6398bf2b350a614071b27d3

    • SHA256

      3e698acdf72d32b8b824bef22359c965bf0664c6de958b25729f95dbefd0281a

    • SHA512

      e091a498c6da896abe724b49e0c3d80cbb913e34000488e845acef89896d4e919f933119684a1aa4c038eb892cd0552dcb5f71500b9f9d8b02665bfe5cd816b1

    • SSDEEP

      24576:FQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVcwpeY7oy:FQZAdVyVT9n/Gg0P+WhompeoX

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks