General

  • Target

    53383e89c520d49365299b709022e0702f0268f7ae728d89d4cf01c88d622212

  • Size

    4.6MB

  • Sample

    241221-z8wnlsznhw

  • MD5

    60b24c0ce57a4039ec6c074ed0d87816

  • SHA1

    733c549a7a5d4e6753f76eff374c52baa3077bda

  • SHA256

    53383e89c520d49365299b709022e0702f0268f7ae728d89d4cf01c88d622212

  • SHA512

    bbf518d748856e62a4785fbe215e18254c4d567b3097d6a66a46c8a1f370e96ecea54ebdae8c817c12e41c0ace491b8e2201c94c5d3b70d523bbc5a8ca634489

  • SSDEEP

    49152:N09XJt4HIN2H2tFvduyS4xbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8bU:uZJt4HINy2LkubXsPN5kiQaZ56

Malware Config

Targets

    • Target

      53383e89c520d49365299b709022e0702f0268f7ae728d89d4cf01c88d622212

    • Size

      4.6MB

    • MD5

      60b24c0ce57a4039ec6c074ed0d87816

    • SHA1

      733c549a7a5d4e6753f76eff374c52baa3077bda

    • SHA256

      53383e89c520d49365299b709022e0702f0268f7ae728d89d4cf01c88d622212

    • SHA512

      bbf518d748856e62a4785fbe215e18254c4d567b3097d6a66a46c8a1f370e96ecea54ebdae8c817c12e41c0ace491b8e2201c94c5d3b70d523bbc5a8ca634489

    • SSDEEP

      49152:N09XJt4HIN2H2tFvduyS4xbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8bU:uZJt4HINy2LkubXsPN5kiQaZ56

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks