General

  • Target

    9bcd6a2e2d967106a5224befe0ea8243d8537ef894c882e0ce410196456d1734

  • Size

    4.6MB

  • Sample

    241120-kzn5vayral

  • MD5

    4f734e8960dc34cec25e0b9f0d244828

  • SHA1

    bb379119b2277b68457a2645eec3d249548dfb79

  • SHA256

    9bcd6a2e2d967106a5224befe0ea8243d8537ef894c882e0ce410196456d1734

  • SHA512

    7e16f97a8cdd550f66622999984bcc9acaf185c51e2982bb752c8768617cf94da4436b8ff055d2bd86e6cccb7e2dbacbbef260d62bd1a406f96bc5954af484e9

  • SSDEEP

    49152:+09XJt4HIN2H2tFvduySLubXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8bU:vZJt4HINy2LkLubXsPN5kiQaZ56

Malware Config

Targets

    • Target

      9bcd6a2e2d967106a5224befe0ea8243d8537ef894c882e0ce410196456d1734

    • Size

      4.6MB

    • MD5

      4f734e8960dc34cec25e0b9f0d244828

    • SHA1

      bb379119b2277b68457a2645eec3d249548dfb79

    • SHA256

      9bcd6a2e2d967106a5224befe0ea8243d8537ef894c882e0ce410196456d1734

    • SHA512

      7e16f97a8cdd550f66622999984bcc9acaf185c51e2982bb752c8768617cf94da4436b8ff055d2bd86e6cccb7e2dbacbbef260d62bd1a406f96bc5954af484e9

    • SSDEEP

      49152:+09XJt4HIN2H2tFvduySLubXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8bU:vZJt4HINy2LkLubXsPN5kiQaZ56

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks