General

  • Target

    f3c0602ea8f12ed9cebea28245b363b4732b403d8801a6b13a203d780ed50ce4

  • Size

    1.3MB

  • Sample

    241114-dg8m7stelc

  • MD5

    ddf3847388c85f1e1e420b452512d074

  • SHA1

    ba3d635767af2c8a1bcf0d93e304ccb86c8e2187

  • SHA256

    f3c0602ea8f12ed9cebea28245b363b4732b403d8801a6b13a203d780ed50ce4

  • SHA512

    2a2cadcb3aa16207cca9872192e07fc923607d92cba1e93459f649d2cc408258da686d3ef967c0160170f457b36740a6d4ddf88c9b1c8bda953a32983629426d

  • SSDEEP

    24576:cQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVQwpezXAF:cQZAdVyVT9n/Gg0P+WhoOpejC

Malware Config

Targets

    • Target

      f3c0602ea8f12ed9cebea28245b363b4732b403d8801a6b13a203d780ed50ce4

    • Size

      1.3MB

    • MD5

      ddf3847388c85f1e1e420b452512d074

    • SHA1

      ba3d635767af2c8a1bcf0d93e304ccb86c8e2187

    • SHA256

      f3c0602ea8f12ed9cebea28245b363b4732b403d8801a6b13a203d780ed50ce4

    • SHA512

      2a2cadcb3aa16207cca9872192e07fc923607d92cba1e93459f649d2cc408258da686d3ef967c0160170f457b36740a6d4ddf88c9b1c8bda953a32983629426d

    • SSDEEP

      24576:cQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVQwpezXAF:cQZAdVyVT9n/Gg0P+WhoOpejC

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks