General

  • Target

    8d24cc3783abd1e6878595186255c679af143e3e096380e18d3f9a4d543d7593

  • Size

    491KB

  • Sample

    241220-h6k1nasrbt

  • MD5

    57a4c7d812a2602d5581344ed3607ccf

  • SHA1

    b6fa263a2e24574c33b6ce664b689834e545b5da

  • SHA256

    8d24cc3783abd1e6878595186255c679af143e3e096380e18d3f9a4d543d7593

  • SHA512

    829dc35f6e5c32a83b01d1dcb76a4f2086fdc30dc33ace3cccee4e5aef4a3cf307aab0731bb62a93807505674b6e15d26d6a4dedf317a63071c1de1d11be2f50

  • SSDEEP

    6144:GpoMkequERu8qQ1fjYMMW9eKZH+IdISTUL24qL9cPKcPzR2Rm6lZv:oDR+u8pfjYMMWNvdhUSByFPzAv

Malware Config

Targets

    • Target

      8d24cc3783abd1e6878595186255c679af143e3e096380e18d3f9a4d543d7593

    • Size

      491KB

    • MD5

      57a4c7d812a2602d5581344ed3607ccf

    • SHA1

      b6fa263a2e24574c33b6ce664b689834e545b5da

    • SHA256

      8d24cc3783abd1e6878595186255c679af143e3e096380e18d3f9a4d543d7593

    • SHA512

      829dc35f6e5c32a83b01d1dcb76a4f2086fdc30dc33ace3cccee4e5aef4a3cf307aab0731bb62a93807505674b6e15d26d6a4dedf317a63071c1de1d11be2f50

    • SSDEEP

      6144:GpoMkequERu8qQ1fjYMMW9eKZH+IdISTUL24qL9cPKcPzR2Rm6lZv:oDR+u8pfjYMMWNvdhUSByFPzAv

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks