General

  • Target

    cd08456ce9c749f0b86bcdb3ec4f305940b8a0e18e5e01ca568725f9838cb7e5

  • Size

    2.7MB

  • Sample

    241203-trsbzaykgn

  • MD5

    22a4ab8faa35f04a3c46a1f0f9aacd61

  • SHA1

    6bae935c6cf8f077fb0edbe6cf5caa4b136466e8

  • SHA256

    cd08456ce9c749f0b86bcdb3ec4f305940b8a0e18e5e01ca568725f9838cb7e5

  • SHA512

    b411115e5903bc9127e6a17698527a6a3bc590adac0f297a170d23476e68089fa4edde9cafe06c35b735a30a1fdfa38e258258c810bfd96280441a66bfb0651a

  • SSDEEP

    49152:ICwsbCANnKXferL7Vwe/Gg0P+WhJLJx3taSLJf:Dws2ANnKXOaeOgmhJlx3taSlf

Malware Config

Targets

    • Target

      cd08456ce9c749f0b86bcdb3ec4f305940b8a0e18e5e01ca568725f9838cb7e5

    • Size

      2.7MB

    • MD5

      22a4ab8faa35f04a3c46a1f0f9aacd61

    • SHA1

      6bae935c6cf8f077fb0edbe6cf5caa4b136466e8

    • SHA256

      cd08456ce9c749f0b86bcdb3ec4f305940b8a0e18e5e01ca568725f9838cb7e5

    • SHA512

      b411115e5903bc9127e6a17698527a6a3bc590adac0f297a170d23476e68089fa4edde9cafe06c35b735a30a1fdfa38e258258c810bfd96280441a66bfb0651a

    • SSDEEP

      49152:ICwsbCANnKXferL7Vwe/Gg0P+WhJLJx3taSLJf:Dws2ANnKXOaeOgmhJlx3taSlf

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks