General

  • Target

    62acc235959a9c0d562ec02c5d67a95b71c6454acaf2cf17a8e63385816fe18e

  • Size

    2.6MB

  • Sample

    241218-h1qnyszncm

  • MD5

    1939565af8070ce66e5a9cff5123b53f

  • SHA1

    291513d896734c41bfc03ac14b88ba05c9d7429f

  • SHA256

    62acc235959a9c0d562ec02c5d67a95b71c6454acaf2cf17a8e63385816fe18e

  • SHA512

    e04cc9016ae9828e5a8dea5e969282b236effbfd56e90330048eb4655f69cb41c12c70dba6bd313142f5ea846dc26170a6d2c63cae6afceee0e0a5102700d6cf

  • SSDEEP

    49152:+jwsbCANnKXferL7Vwe/Gg0P+WheDmn2C:cws2ANnKXOaeOgmheDmn2C

Malware Config

Targets

    • Target

      62acc235959a9c0d562ec02c5d67a95b71c6454acaf2cf17a8e63385816fe18e

    • Size

      2.6MB

    • MD5

      1939565af8070ce66e5a9cff5123b53f

    • SHA1

      291513d896734c41bfc03ac14b88ba05c9d7429f

    • SHA256

      62acc235959a9c0d562ec02c5d67a95b71c6454acaf2cf17a8e63385816fe18e

    • SHA512

      e04cc9016ae9828e5a8dea5e969282b236effbfd56e90330048eb4655f69cb41c12c70dba6bd313142f5ea846dc26170a6d2c63cae6afceee0e0a5102700d6cf

    • SSDEEP

      49152:+jwsbCANnKXferL7Vwe/Gg0P+WheDmn2C:cws2ANnKXOaeOgmheDmn2C

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks