General

  • Target

    52c8a9d77902c28e3bd54ae540a950b74f03f9b976efe42da0adac1cf7088241

  • Size

    512KB

  • Sample

    241216-qsfssa1pfy

  • MD5

    f48442aa73b737ff87c210e59ff49489

  • SHA1

    f1c984c462557b5386608d259277e6c4375021e0

  • SHA256

    52c8a9d77902c28e3bd54ae540a950b74f03f9b976efe42da0adac1cf7088241

  • SHA512

    fd8efcdd2704711337e3bb63b7fa983ef17ffee84342b37154ab384e1734b3e662187ddb301017070cdf5e5d3193acb2996d57a7d2cf3fd71133c6ec43f53985

  • SSDEEP

    12288:y6vt/FcUrAqObSVsy7/J+KnUHwNudfjvLxu1K5etQsS0zWbtz68J2Q:XvrADCr/JNOwNudf81KOS/t3U

Malware Config

Targets

    • Target

      52c8a9d77902c28e3bd54ae540a950b74f03f9b976efe42da0adac1cf7088241

    • Size

      512KB

    • MD5

      f48442aa73b737ff87c210e59ff49489

    • SHA1

      f1c984c462557b5386608d259277e6c4375021e0

    • SHA256

      52c8a9d77902c28e3bd54ae540a950b74f03f9b976efe42da0adac1cf7088241

    • SHA512

      fd8efcdd2704711337e3bb63b7fa983ef17ffee84342b37154ab384e1734b3e662187ddb301017070cdf5e5d3193acb2996d57a7d2cf3fd71133c6ec43f53985

    • SSDEEP

      12288:y6vt/FcUrAqObSVsy7/J+KnUHwNudfjvLxu1K5etQsS0zWbtz68J2Q:XvrADCr/JNOwNudf81KOS/t3U

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks