General

  • Target

    53b4c7f88741a3cc3cb2584c238700453198878f3072bbc8d167a4cd1f37fc89

  • Size

    2.7MB

  • Sample

    241113-tvsf5svfnh

  • MD5

    a1de0fac5ed758e59f14ac0a9a0db13d

  • SHA1

    90bbb053c1e887a8bce92cb489f06835b2e20146

  • SHA256

    53b4c7f88741a3cc3cb2584c238700453198878f3072bbc8d167a4cd1f37fc89

  • SHA512

    2f3e5f9278b2c11c2832a70c2f5e8b1dcaad501ad6488b583d8493bb3b006fb93b1cbb2f63bed2fff599a202a6b2ab597d3df39032add883d5f931154f300f04

  • SSDEEP

    49152:ZCwsbCANnKXferL7Vwe/Gg0P+WhODmn2:Uws2ANnKXOaeOgmhODmn2

Malware Config

Targets

    • Target

      53b4c7f88741a3cc3cb2584c238700453198878f3072bbc8d167a4cd1f37fc89

    • Size

      2.7MB

    • MD5

      a1de0fac5ed758e59f14ac0a9a0db13d

    • SHA1

      90bbb053c1e887a8bce92cb489f06835b2e20146

    • SHA256

      53b4c7f88741a3cc3cb2584c238700453198878f3072bbc8d167a4cd1f37fc89

    • SHA512

      2f3e5f9278b2c11c2832a70c2f5e8b1dcaad501ad6488b583d8493bb3b006fb93b1cbb2f63bed2fff599a202a6b2ab597d3df39032add883d5f931154f300f04

    • SSDEEP

      49152:ZCwsbCANnKXferL7Vwe/Gg0P+WhODmn2:Uws2ANnKXOaeOgmhODmn2

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks