General

  • Target

    6a4cda43bcfeac34b74220ddf966097b9a03836e47ce89ed6f3d8d328164c2cc

  • Size

    4.5MB

  • Sample

    241217-n7ah7symdw

  • MD5

    aaafd4764db7d99459994bb348a5a39b

  • SHA1

    cd03e5fdd41cdc18ad1ada9f7042afcfec2e30cb

  • SHA256

    6a4cda43bcfeac34b74220ddf966097b9a03836e47ce89ed6f3d8d328164c2cc

  • SHA512

    2497df81572db2731544d00a5d798e2454d5d310b44176902a38ec3e683005dac43377978ee202d6cbbecdcfd18acb8cb8223a8bf501609097d4a68d0048e177

  • SSDEEP

    49152:w09XJt4HIN2H2tFvduySngVbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8w:1ZJt4HINy2LkgVbXsPN5kiQaZ56

Malware Config

Targets

    • Target

      6a4cda43bcfeac34b74220ddf966097b9a03836e47ce89ed6f3d8d328164c2cc

    • Size

      4.5MB

    • MD5

      aaafd4764db7d99459994bb348a5a39b

    • SHA1

      cd03e5fdd41cdc18ad1ada9f7042afcfec2e30cb

    • SHA256

      6a4cda43bcfeac34b74220ddf966097b9a03836e47ce89ed6f3d8d328164c2cc

    • SHA512

      2497df81572db2731544d00a5d798e2454d5d310b44176902a38ec3e683005dac43377978ee202d6cbbecdcfd18acb8cb8223a8bf501609097d4a68d0048e177

    • SSDEEP

      49152:w09XJt4HIN2H2tFvduySngVbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8w:1ZJt4HINy2LkgVbXsPN5kiQaZ56

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks