General

  • Target

    937bb82a3612666c1480cf0b56dec2bbc0913b251a82961871d850f4301bd815

  • Size

    3.4MB

  • Sample

    241109-as1j7awkgp

  • MD5

    5ba05d0e1f629bcdec56c07e0582bc32

  • SHA1

    4e1c9780491432d3156df92058aee4df519274bc

  • SHA256

    937bb82a3612666c1480cf0b56dec2bbc0913b251a82961871d850f4301bd815

  • SHA512

    42fe5b9701d32079c5e201a9b4dbe5089e0e7c8151659a795341fbe4e939b9efbf88e8c3b1e5c1f5a508237cf24b12e5e1039987060e93d65bdaa919b8281aa6

  • SSDEEP

    49152:ajwsbCANnKXferL7Vwe/Gg0P+WhgaggDmn2SCt5jT0:Aws2ANnKXOaeOgmhgfgDmn2Pj

Malware Config

Targets

    • Target

      937bb82a3612666c1480cf0b56dec2bbc0913b251a82961871d850f4301bd815

    • Size

      3.4MB

    • MD5

      5ba05d0e1f629bcdec56c07e0582bc32

    • SHA1

      4e1c9780491432d3156df92058aee4df519274bc

    • SHA256

      937bb82a3612666c1480cf0b56dec2bbc0913b251a82961871d850f4301bd815

    • SHA512

      42fe5b9701d32079c5e201a9b4dbe5089e0e7c8151659a795341fbe4e939b9efbf88e8c3b1e5c1f5a508237cf24b12e5e1039987060e93d65bdaa919b8281aa6

    • SSDEEP

      49152:ajwsbCANnKXferL7Vwe/Gg0P+WhgaggDmn2SCt5jT0:Aws2ANnKXOaeOgmhgfgDmn2Pj

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks