General

  • Target

    56dd157bbfede1d15cb1169613abc944c2364a138e27a4a118c78847ebc9bd72.dll

  • Size

    1.6MB

  • Sample

    241110-cwyk4sxfpc

  • MD5

    c5d9033a0433e8d19e9f8c1970dc6d5d

  • SHA1

    a779adcd489edb6bde7c13a817fdec604c781635

  • SHA256

    56dd157bbfede1d15cb1169613abc944c2364a138e27a4a118c78847ebc9bd72

  • SHA512

    23114c7b797462046b153e44b26a20724c6ffb94d7211d5ee75497fae11eb32ac1450505dd13b3d045447226fc7071c90d66c39c568512b2a7f2e1079355ca15

  • SSDEEP

    24576:4pLOet+FXyv5pGJd1GdQmw7dj6ypuNiTdjvPG4/:4pLnt+FS+1GnAj4ipjnL/

Malware Config

Targets

    • Target

      56dd157bbfede1d15cb1169613abc944c2364a138e27a4a118c78847ebc9bd72.dll

    • Size

      1.6MB

    • MD5

      c5d9033a0433e8d19e9f8c1970dc6d5d

    • SHA1

      a779adcd489edb6bde7c13a817fdec604c781635

    • SHA256

      56dd157bbfede1d15cb1169613abc944c2364a138e27a4a118c78847ebc9bd72

    • SHA512

      23114c7b797462046b153e44b26a20724c6ffb94d7211d5ee75497fae11eb32ac1450505dd13b3d045447226fc7071c90d66c39c568512b2a7f2e1079355ca15

    • SSDEEP

      24576:4pLOet+FXyv5pGJd1GdQmw7dj6ypuNiTdjvPG4/:4pLnt+FS+1GnAj4ipjnL/

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Blocklisted process makes network request

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks