General

  • Target

    24de619d714456dbba177b8461b82e889b63f96f154f722f01029d22b59399c7

  • Size

    2.0MB

  • Sample

    241114-e61jkavckh

  • MD5

    7c42c0289a8ef2395efc1e7925b2d16e

  • SHA1

    5b75f9495a791d982e269f3fb4dcac2b95f5138c

  • SHA256

    24de619d714456dbba177b8461b82e889b63f96f154f722f01029d22b59399c7

  • SHA512

    01e5a6f9a5145e01603c84f772e038b2ee40e45fb4d9b307269b199411fa68127e2443ede7ea30f0c630d2c84090de2c38b75ff8e139a7886e341e82b36750bc

  • SSDEEP

    24576:hCIRyPP2GXKWAftKuRz2tgJZA5r5NCLytLSBy/r4/c4W6dVypXkPckF+XM/HU93G:CPBKWO02gSAIW4k4W6fskkkF+SHU932B

Malware Config

Targets

    • Target

      24de619d714456dbba177b8461b82e889b63f96f154f722f01029d22b59399c7

    • Size

      2.0MB

    • MD5

      7c42c0289a8ef2395efc1e7925b2d16e

    • SHA1

      5b75f9495a791d982e269f3fb4dcac2b95f5138c

    • SHA256

      24de619d714456dbba177b8461b82e889b63f96f154f722f01029d22b59399c7

    • SHA512

      01e5a6f9a5145e01603c84f772e038b2ee40e45fb4d9b307269b199411fa68127e2443ede7ea30f0c630d2c84090de2c38b75ff8e139a7886e341e82b36750bc

    • SSDEEP

      24576:hCIRyPP2GXKWAftKuRz2tgJZA5r5NCLytLSBy/r4/c4W6dVypXkPckF+XM/HU93G:CPBKWO02gSAIW4k4W6fskkkF+SHU932B

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks