General

  • Target

    9a3b5d7b9160ce8dfc4c8ab124854186aedf85bfbb606b02a8f619bf0c88873b

  • Size

    2.5MB

  • Sample

    241217-3blnxsslax

  • MD5

    47f643d239aadb5baa496cdd37fad71e

  • SHA1

    0c0c78f4e8ab9e74671bfc112da90b7ad4de7a3a

  • SHA256

    9a3b5d7b9160ce8dfc4c8ab124854186aedf85bfbb606b02a8f619bf0c88873b

  • SHA512

    f47d748a39014f458b3b096f177cf111b85ac01bc6444b5a43044233b78dbc27f080127d8de63e29eaf43f1f9f0ab61fc7ee3e45fc6c2bb3d3227b80191519dc

  • SSDEEP

    12288:JhymnwJFPNdgBAEHApqePJN1AmLM7uVq9sSaSHS:JUmwrl2Ao7sJNlM7ymsSal

Malware Config

Targets

    • Target

      9a3b5d7b9160ce8dfc4c8ab124854186aedf85bfbb606b02a8f619bf0c88873b

    • Size

      2.5MB

    • MD5

      47f643d239aadb5baa496cdd37fad71e

    • SHA1

      0c0c78f4e8ab9e74671bfc112da90b7ad4de7a3a

    • SHA256

      9a3b5d7b9160ce8dfc4c8ab124854186aedf85bfbb606b02a8f619bf0c88873b

    • SHA512

      f47d748a39014f458b3b096f177cf111b85ac01bc6444b5a43044233b78dbc27f080127d8de63e29eaf43f1f9f0ab61fc7ee3e45fc6c2bb3d3227b80191519dc

    • SSDEEP

      12288:JhymnwJFPNdgBAEHApqePJN1AmLM7uVq9sSaSHS:JUmwrl2Ao7sJNlM7ymsSal

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks