General

  • Target

    07426fd6f4c55e5e7ed9d835fe90810ba6df3156c9c8f24c0260b0062c64636f

  • Size

    611KB

  • Sample

    241107-hypc4sxhkb

  • MD5

    125f71ce4ebd01c3cf45b8cd48df93de

  • SHA1

    1887c2291d49fe802691a47ed94efc4de121f03f

  • SHA256

    07426fd6f4c55e5e7ed9d835fe90810ba6df3156c9c8f24c0260b0062c64636f

  • SHA512

    4c53909577fc2413a14736e97cfb472c9c24f7530fa1d4b9c5f212bff570e82dde8d6761a296d8fe7fab85c94c721308bd71e0bb2c842b8b44b463e4aeeb11d9

  • SSDEEP

    12288:SFpuzZSkcBNrl5mTEUkDaSdJfpSaoNRVBUyMCe8VMM80B7qrI3iK1XBwZQ:SFmShDrngEUkDaiJfpSaoNRpMCe8CM8T

Malware Config

Targets

    • Target

      07426fd6f4c55e5e7ed9d835fe90810ba6df3156c9c8f24c0260b0062c64636f

    • Size

      611KB

    • MD5

      125f71ce4ebd01c3cf45b8cd48df93de

    • SHA1

      1887c2291d49fe802691a47ed94efc4de121f03f

    • SHA256

      07426fd6f4c55e5e7ed9d835fe90810ba6df3156c9c8f24c0260b0062c64636f

    • SHA512

      4c53909577fc2413a14736e97cfb472c9c24f7530fa1d4b9c5f212bff570e82dde8d6761a296d8fe7fab85c94c721308bd71e0bb2c842b8b44b463e4aeeb11d9

    • SSDEEP

      12288:SFpuzZSkcBNrl5mTEUkDaSdJfpSaoNRVBUyMCe8VMM80B7qrI3iK1XBwZQ:SFmShDrngEUkDaiJfpSaoNRpMCe8CM8T

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks