General

  • Target

    fa63aafc4ea58ef2db26e63b4c1c1d0dc22dbdcfa9e3875d707a3756ee19b38d

  • Size

    2.3MB

  • Sample

    241221-zbwbksyraq

  • MD5

    1f081a97669ad7a721fb191d7aba851a

  • SHA1

    20609bf079cc343a311f4979e4abfd1585d5fc1e

  • SHA256

    fa63aafc4ea58ef2db26e63b4c1c1d0dc22dbdcfa9e3875d707a3756ee19b38d

  • SHA512

    31e39a66bd26a1794dc90625db760bd82367e0c8afe9f0bc3d2a3fed4a373d469a5a78a6d7abbe184e1d92f4644e9903406bca769be94a51d6953b74e65fd808

  • SSDEEP

    24576:2CwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHU:2CwsbCANnKXferL7Vwe/Gg0P+WhYpo

Malware Config

Targets

    • Target

      fa63aafc4ea58ef2db26e63b4c1c1d0dc22dbdcfa9e3875d707a3756ee19b38d

    • Size

      2.3MB

    • MD5

      1f081a97669ad7a721fb191d7aba851a

    • SHA1

      20609bf079cc343a311f4979e4abfd1585d5fc1e

    • SHA256

      fa63aafc4ea58ef2db26e63b4c1c1d0dc22dbdcfa9e3875d707a3756ee19b38d

    • SHA512

      31e39a66bd26a1794dc90625db760bd82367e0c8afe9f0bc3d2a3fed4a373d469a5a78a6d7abbe184e1d92f4644e9903406bca769be94a51d6953b74e65fd808

    • SSDEEP

      24576:2CwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHU:2CwsbCANnKXferL7Vwe/Gg0P+WhYpo

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks