General

  • Target

    e615a3adcad4e531b71d760d08e05108fa1c7f96b62511e8e37a29b13f9051e6

  • Size

    1.8MB

  • Sample

    241220-jnhcgstkhv

  • MD5

    28e427a5b2d44a0dc4e5dbac6291e348

  • SHA1

    623964934635e6d82fcb30e0c128864c9ff36d1c

  • SHA256

    e615a3adcad4e531b71d760d08e05108fa1c7f96b62511e8e37a29b13f9051e6

  • SHA512

    7f77dfe1108c19f4315e950aaa12a93220cd1616d81629099ebda9b4e161fcba14a36e00677cc968a0fb0fabaeb0a4dbd09ae0386f6746ec117a76157bc5a05c

  • SSDEEP

    49152:n09XJt4HIN2H2tFvduyS3pe5gnZPItx2apeapelI:0ZJt4HINy2LkUGatUvlI

Malware Config

Targets

    • Target

      e615a3adcad4e531b71d760d08e05108fa1c7f96b62511e8e37a29b13f9051e6

    • Size

      1.8MB

    • MD5

      28e427a5b2d44a0dc4e5dbac6291e348

    • SHA1

      623964934635e6d82fcb30e0c128864c9ff36d1c

    • SHA256

      e615a3adcad4e531b71d760d08e05108fa1c7f96b62511e8e37a29b13f9051e6

    • SHA512

      7f77dfe1108c19f4315e950aaa12a93220cd1616d81629099ebda9b4e161fcba14a36e00677cc968a0fb0fabaeb0a4dbd09ae0386f6746ec117a76157bc5a05c

    • SSDEEP

      49152:n09XJt4HIN2H2tFvduyS3pe5gnZPItx2apeapelI:0ZJt4HINy2LkUGatUvlI

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks