General

  • Target

    630155dd06b45e9d804b0e5112a1983cd2bfa590816a70c4a353cf21794e2def.exe

  • Size

    3.8MB

  • Sample

    241225-tpmnpsxqbz

  • MD5

    4e98e878bdcd6d9e77fabf2e1c2f780b

  • SHA1

    e4986c4993006ce32858bd11a4e97969138d0fe0

  • SHA256

    630155dd06b45e9d804b0e5112a1983cd2bfa590816a70c4a353cf21794e2def

  • SHA512

    f61e81d183aa4ebe37a1060424beffa66425819cc5ccb09e945be76c3370136583c02a941b6eb003632856af536901ed92b18008ba4919fbd6a37600434282fe

  • SSDEEP

    98304:ITcOeIdcUP6wg45kHjObfMSDzbF7jo7t1a/l+6n:IceP5kHqN7joR0/l5

Malware Config

Targets

    • Target

      630155dd06b45e9d804b0e5112a1983cd2bfa590816a70c4a353cf21794e2def.exe

    • Size

      3.8MB

    • MD5

      4e98e878bdcd6d9e77fabf2e1c2f780b

    • SHA1

      e4986c4993006ce32858bd11a4e97969138d0fe0

    • SHA256

      630155dd06b45e9d804b0e5112a1983cd2bfa590816a70c4a353cf21794e2def

    • SHA512

      f61e81d183aa4ebe37a1060424beffa66425819cc5ccb09e945be76c3370136583c02a941b6eb003632856af536901ed92b18008ba4919fbd6a37600434282fe

    • SSDEEP

      98304:ITcOeIdcUP6wg45kHjObfMSDzbF7jo7t1a/l+6n:IceP5kHqN7joR0/l5

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks