General

  • Target

    1da295656325d4968ac31df3229102553f6ef8d4b1f800bcacd768c89d767e83

  • Size

    2.0MB

  • Sample

    241112-r7nbvatnax

  • MD5

    e49f609e5198d00c184f210ea2a7fe94

  • SHA1

    84a8868c2aa89fcec30bbe482da9e8f3376c5ea2

  • SHA256

    1da295656325d4968ac31df3229102553f6ef8d4b1f800bcacd768c89d767e83

  • SHA512

    6112e7561cb43f0818ce9e69c6dbf9cd4c61be361d038afdaf8ef26edc95078633ac15466c9a2cc2c4f50879672d14a9abd04f2bfe5b101bfb894d3241b21ea3

  • SSDEEP

    24576:JQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cV2U3M4Y+WN5mmT7Kf:JQZAdVyVT9n/Gg0P+WhohUMvfKf

Malware Config

Targets

    • Target

      1da295656325d4968ac31df3229102553f6ef8d4b1f800bcacd768c89d767e83

    • Size

      2.0MB

    • MD5

      e49f609e5198d00c184f210ea2a7fe94

    • SHA1

      84a8868c2aa89fcec30bbe482da9e8f3376c5ea2

    • SHA256

      1da295656325d4968ac31df3229102553f6ef8d4b1f800bcacd768c89d767e83

    • SHA512

      6112e7561cb43f0818ce9e69c6dbf9cd4c61be361d038afdaf8ef26edc95078633ac15466c9a2cc2c4f50879672d14a9abd04f2bfe5b101bfb894d3241b21ea3

    • SSDEEP

      24576:JQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cV2U3M4Y+WN5mmT7Kf:JQZAdVyVT9n/Gg0P+WhohUMvfKf

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks