General

  • Target

    46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe

  • Size

    7.2MB

  • Sample

    241203-thjy8ssles

  • MD5

    3ddb25fb8127c1ff0b5108ad3c1306bf

  • SHA1

    bffc34d8e9cdcba6574b758048073389a15c9c59

  • SHA256

    46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe

  • SHA512

    d791550e760b457104e8235929585cf5372d03def61af33dfa5c4fe4b5caa143c34737d791ece975da0474d10e01cb7df015c1f566856eb8698760f2bd720723

  • SSDEEP

    98304:Gws2ANnKXOaeOgmhtASKlmkt6U+66sJZDJ1W+zitw4JJOKAWb86MFkNgDlPRt/Fd:0KXbeO73IlmILFJNJEvbTwqNghptf

Malware Config

Targets

    • Target

      46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe

    • Size

      7.2MB

    • MD5

      3ddb25fb8127c1ff0b5108ad3c1306bf

    • SHA1

      bffc34d8e9cdcba6574b758048073389a15c9c59

    • SHA256

      46c3b76197bb59658b87dd017351f46ce5a2a62a68ce5fb108d4eb77460086fe

    • SHA512

      d791550e760b457104e8235929585cf5372d03def61af33dfa5c4fe4b5caa143c34737d791ece975da0474d10e01cb7df015c1f566856eb8698760f2bd720723

    • SSDEEP

      98304:Gws2ANnKXOaeOgmhtASKlmkt6U+66sJZDJ1W+zitw4JJOKAWb86MFkNgDlPRt/Fd:0KXbeO73IlmILFJNJEvbTwqNghptf

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks