General

  • Target

    15922257c01a608ee9cde69475b9cdc7f0871406e7fc82638ac45417522c7d3c

  • Size

    1.7MB

  • Sample

    241106-kpyljazjar

  • MD5

    528ab892d5c9ed40a0e7dfb71ef29b49

  • SHA1

    968665e659a93656091742495ae90ae2506f873e

  • SHA256

    15922257c01a608ee9cde69475b9cdc7f0871406e7fc82638ac45417522c7d3c

  • SHA512

    7d20e88a42dd573292c49be96a0bc7d877cf43aac805e1a18a482436ab70ef348ab0493f79c0ac322211563058a70ecff739ed149f1326e70be3f3069e868f50

  • SSDEEP

    24576:JQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cV2U3M4Y+WN5mmT7Ki:JQZAdVyVT9n/Gg0P+WhohUMvfKi

Malware Config

Targets

    • Target

      15922257c01a608ee9cde69475b9cdc7f0871406e7fc82638ac45417522c7d3c

    • Size

      1.7MB

    • MD5

      528ab892d5c9ed40a0e7dfb71ef29b49

    • SHA1

      968665e659a93656091742495ae90ae2506f873e

    • SHA256

      15922257c01a608ee9cde69475b9cdc7f0871406e7fc82638ac45417522c7d3c

    • SHA512

      7d20e88a42dd573292c49be96a0bc7d877cf43aac805e1a18a482436ab70ef348ab0493f79c0ac322211563058a70ecff739ed149f1326e70be3f3069e868f50

    • SSDEEP

      24576:JQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cV2U3M4Y+WN5mmT7Ki:JQZAdVyVT9n/Gg0P+WhohUMvfKi

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks