General

  • Target

    7cb9abb047c98323f6b5b352786de67c1fd071626a94a5d6727ad0f704deea72

  • Size

    4.1MB

  • Sample

    241219-maf42sznhw

  • MD5

    5db679739df397213d09e97fe16a68ae

  • SHA1

    95a6772330bc0bc35fa7be0cb33377e275bba2f7

  • SHA256

    7cb9abb047c98323f6b5b352786de67c1fd071626a94a5d6727ad0f704deea72

  • SHA512

    58010ef0d0b21e56696ce79e92a9c9dc21df98770b779e0b54c66f08d4a77424740189936472115d1d1507a994c6c489a2d8a7fb4d4f158b7593218793338cd8

  • SSDEEP

    49152:dCwsbCANnKXferL7Vwe/Gg0P+WhTseOazv2MRrTIGGiert88NXmckpe9Z:gws2ANnKXOaeOgmhT+MRrTIOe+8

Malware Config

Targets

    • Target

      7cb9abb047c98323f6b5b352786de67c1fd071626a94a5d6727ad0f704deea72

    • Size

      4.1MB

    • MD5

      5db679739df397213d09e97fe16a68ae

    • SHA1

      95a6772330bc0bc35fa7be0cb33377e275bba2f7

    • SHA256

      7cb9abb047c98323f6b5b352786de67c1fd071626a94a5d6727ad0f704deea72

    • SHA512

      58010ef0d0b21e56696ce79e92a9c9dc21df98770b779e0b54c66f08d4a77424740189936472115d1d1507a994c6c489a2d8a7fb4d4f158b7593218793338cd8

    • SSDEEP

      49152:dCwsbCANnKXferL7Vwe/Gg0P+WhTseOazv2MRrTIGGiert88NXmckpe9Z:gws2ANnKXOaeOgmhT+MRrTIOe+8

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks