General

  • Target

    63fdeec62e78c9c5c6a4249c4b58b85d34e1ddf7b47f6e46257be4f93b703c72

  • Size

    1.7MB

  • Sample

    241223-s8amtatndm

  • MD5

    469d3951ab182e7670feb67f4b461a82

  • SHA1

    c8591e43f3119fde38a725671f883c3eedd3d22c

  • SHA256

    63fdeec62e78c9c5c6a4249c4b58b85d34e1ddf7b47f6e46257be4f93b703c72

  • SHA512

    2994015b87a1d3e106327f4a0132b32d1f60d50c661f002e5092b74caa9844282ac8413ce7c68a4d24d22b8fcf6eff740bf82f8b8c41637f4ac480f8f3c8e5fd

  • SSDEEP

    24576:P0/RLoHZ2AkKIEkK48rktw9E4/vwZ31dvAhuiTFli7X8uZyzo1dqtbVEj3i4zcyz:P0to5lLIxKewS4+KPOX8uQzo16E/cyvL

Malware Config

Targets

    • Target

      63fdeec62e78c9c5c6a4249c4b58b85d34e1ddf7b47f6e46257be4f93b703c72

    • Size

      1.7MB

    • MD5

      469d3951ab182e7670feb67f4b461a82

    • SHA1

      c8591e43f3119fde38a725671f883c3eedd3d22c

    • SHA256

      63fdeec62e78c9c5c6a4249c4b58b85d34e1ddf7b47f6e46257be4f93b703c72

    • SHA512

      2994015b87a1d3e106327f4a0132b32d1f60d50c661f002e5092b74caa9844282ac8413ce7c68a4d24d22b8fcf6eff740bf82f8b8c41637f4ac480f8f3c8e5fd

    • SSDEEP

      24576:P0/RLoHZ2AkKIEkK48rktw9E4/vwZ31dvAhuiTFli7X8uZyzo1dqtbVEj3i4zcyz:P0to5lLIxKewS4+KPOX8uQzo16E/cyvL

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks