General

  • Target

    5fd0ebbcdb12554776d3fe675d9cca688d7886686b655a8abff955ab609ff008

  • Size

    339KB

  • MD5

    15302e9bba6d51c7f7a6b3e6ee6ff305

  • SHA1

    414192401a486b0caeb742e764c7f826546816c7

  • SHA256

    5fd0ebbcdb12554776d3fe675d9cca688d7886686b655a8abff955ab609ff008

  • SHA512

    dc78a3a97240c69af0a847f106f66c0295fa4e94336e4eb75b2db979efc684f5d49e567cc4f78cb5490a090071dfcfdd8c5e4de2bf281eb2dd122af73944b709

  • SSDEEP

    6144:cb0tEIZDKioPqNuySZ1TCJVsgBEQYHeycBJ6jSvJoU19pkazIAW:cUp5wPEno1TC0pLy36jSvJN1Hv

Malware Config

Signatures

  • Detect PurpleFox Rootkit 1 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 1 IoCs
  • Gh0strat family
  • Purplefox family
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 5fd0ebbcdb12554776d3fe675d9cca688d7886686b655a8abff955ab609ff008
    .dll windows:4 windows x86 arch:x86


    Headers

    Exports

    Sections

  • out.upx
    .dll windows:4 windows x86 arch:x86


    Headers

    Sections