General

  • Target

    bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af

  • Size

    2.9MB

  • Sample

    241124-y11f6atlcp

  • MD5

    fe86e62f1f8cc2b9160c316c7e1ccffd

  • SHA1

    540ed568fad46b2e4bccd6460e98e7e07a78068f

  • SHA256

    bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af

  • SHA512

    1cbe0eba13af47bfa1781d766dfaab6a0a185afa8f48694b5aab25c20a557101b69b63977a04c4cef0f9b5fde66deaea888e459f755fdee99c061e63f7eeb48a

  • SSDEEP

    49152:Mh2n9VNAIW4k4W6fskkkF+SHU932E0DIR:Msn9Vhek2rv0DIR

Malware Config

Targets

    • Target

      bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af

    • Size

      2.9MB

    • MD5

      fe86e62f1f8cc2b9160c316c7e1ccffd

    • SHA1

      540ed568fad46b2e4bccd6460e98e7e07a78068f

    • SHA256

      bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af

    • SHA512

      1cbe0eba13af47bfa1781d766dfaab6a0a185afa8f48694b5aab25c20a557101b69b63977a04c4cef0f9b5fde66deaea888e459f755fdee99c061e63f7eeb48a

    • SSDEEP

      49152:Mh2n9VNAIW4k4W6fskkkF+SHU932E0DIR:Msn9Vhek2rv0DIR

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks