General

  • Target

    486ae8a61365b250c7d130d8ed2c8453b89e74a00c29a29f24b2b1fcd55dc62a

  • Size

    8.4MB

  • Sample

    241111-gfr6lstgjn

  • MD5

    af7b6d47ab7c9a4b05a4fb485026a2ce

  • SHA1

    7f812ce2b5638958b194c819dbf05aedd89b074f

  • SHA256

    486ae8a61365b250c7d130d8ed2c8453b89e74a00c29a29f24b2b1fcd55dc62a

  • SHA512

    198f5dbf153bec841cefec3f203e0d75a4ed8527503b5da68be0c7487c9d3e0d87d5bfebea74e3f660578afbfd9f2322200dc1678a8633489575cdba35c8bbe1

  • SSDEEP

    98304:Ews2ANnKXOaeOgmhPoVTgjrRbKLoQKOyar9DWYEGlkZi+jtRmX9c3WQ1EAK:SKXbeO7UgVT4r8FQkAqmXu3WPx

Malware Config

Targets

    • Target

      486ae8a61365b250c7d130d8ed2c8453b89e74a00c29a29f24b2b1fcd55dc62a

    • Size

      8.4MB

    • MD5

      af7b6d47ab7c9a4b05a4fb485026a2ce

    • SHA1

      7f812ce2b5638958b194c819dbf05aedd89b074f

    • SHA256

      486ae8a61365b250c7d130d8ed2c8453b89e74a00c29a29f24b2b1fcd55dc62a

    • SHA512

      198f5dbf153bec841cefec3f203e0d75a4ed8527503b5da68be0c7487c9d3e0d87d5bfebea74e3f660578afbfd9f2322200dc1678a8633489575cdba35c8bbe1

    • SSDEEP

      98304:Ews2ANnKXOaeOgmhPoVTgjrRbKLoQKOyar9DWYEGlkZi+jtRmX9c3WQ1EAK:SKXbeO7UgVT4r8FQkAqmXu3WPx

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks