General

  • Target

    c1299c1c23bdf73e1637b773036707cd2f02e5f73d3a095f4ee2f8c50218a1eb

  • Size

    2.6MB

  • Sample

    241109-aq7kqatara

  • MD5

    d4a7ce2fa1f0ad773ebb8465370ff3ef

  • SHA1

    92e6a0bd3cef63084280ddcb8c3c9c4c53c66409

  • SHA256

    c1299c1c23bdf73e1637b773036707cd2f02e5f73d3a095f4ee2f8c50218a1eb

  • SHA512

    a11b439540f815e867d5c74e50dd5ebaeed43cf5d0b80ba1f17a878764d965309576b13cd0de2d62b923152825607eeaf2b282baf2a69bf87a728499269296cf

  • SSDEEP

    49152:ajwsbCANnKXferL7Vwe/Gg0P+WhgaggDmn2L:Aws2ANnKXOaeOgmhgfgDmn2L

Malware Config

Targets

    • Target

      c1299c1c23bdf73e1637b773036707cd2f02e5f73d3a095f4ee2f8c50218a1eb

    • Size

      2.6MB

    • MD5

      d4a7ce2fa1f0ad773ebb8465370ff3ef

    • SHA1

      92e6a0bd3cef63084280ddcb8c3c9c4c53c66409

    • SHA256

      c1299c1c23bdf73e1637b773036707cd2f02e5f73d3a095f4ee2f8c50218a1eb

    • SHA512

      a11b439540f815e867d5c74e50dd5ebaeed43cf5d0b80ba1f17a878764d965309576b13cd0de2d62b923152825607eeaf2b282baf2a69bf87a728499269296cf

    • SSDEEP

      49152:ajwsbCANnKXferL7Vwe/Gg0P+WhgaggDmn2L:Aws2ANnKXOaeOgmhgfgDmn2L

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks