General

  • Target

    4477bdb5901d365366d6fb69c28621d19155d579240ee7f248c01ba5c6b50633

  • Size

    10.7MB

  • Sample

    241203-tmsryasncw

  • MD5

    fc3aeb4053d0a0ce3c3d6b737f5bfc17

  • SHA1

    828479fe608e98cc10668f1c2d4c19e75ad70d4f

  • SHA256

    4477bdb5901d365366d6fb69c28621d19155d579240ee7f248c01ba5c6b50633

  • SHA512

    51bbad1d481741a58bb0a1f853e5b7a06c3b3c1b0046b1863e5fb6eaeebb01430b8aa04ca574531588e3aea6330bfe7b7777af07acbdb0114c6e02126da175d0

  • SSDEEP

    196608:FKXbeO7k17WaHo7jA8/sQWsSxACKPXGb5KZt7QZsumIL27N0ZcPpIBHpIBeO:u78WaHo7EbAPebQZdcsuO

Malware Config

Targets

    • Target

      4477bdb5901d365366d6fb69c28621d19155d579240ee7f248c01ba5c6b50633

    • Size

      10.7MB

    • MD5

      fc3aeb4053d0a0ce3c3d6b737f5bfc17

    • SHA1

      828479fe608e98cc10668f1c2d4c19e75ad70d4f

    • SHA256

      4477bdb5901d365366d6fb69c28621d19155d579240ee7f248c01ba5c6b50633

    • SHA512

      51bbad1d481741a58bb0a1f853e5b7a06c3b3c1b0046b1863e5fb6eaeebb01430b8aa04ca574531588e3aea6330bfe7b7777af07acbdb0114c6e02126da175d0

    • SSDEEP

      196608:FKXbeO7k17WaHo7jA8/sQWsSxACKPXGb5KZt7QZsumIL27N0ZcPpIBHpIBeO:u78WaHo7EbAPebQZdcsuO

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks