General

  • Target

    74fe04b93f0fff3d90bae6cbfb0ae162f442853f886588758d54d0c03e95940a

  • Size

    2.5MB

  • Sample

    241227-r2kzjawpbj

  • MD5

    dea7d47a4f5f1a0bb893eccbef512b37

  • SHA1

    5248688b73e8a389d4a47eb8c1e6c198e1557a58

  • SHA256

    74fe04b93f0fff3d90bae6cbfb0ae162f442853f886588758d54d0c03e95940a

  • SHA512

    67fe04c28f73b768e6617193ea5b3c1bd8264ce5e0a72f90b755fed4298d3380a3e05ea40fd28eddbd6e9dbbab319b111613b93c58b9c7dac824dfebf1977df0

  • SSDEEP

    24576:LCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nH1:LCwsbCANnKXferL7Vwe/Gg0P+WhC/

Malware Config

Targets

    • Target

      74fe04b93f0fff3d90bae6cbfb0ae162f442853f886588758d54d0c03e95940a

    • Size

      2.5MB

    • MD5

      dea7d47a4f5f1a0bb893eccbef512b37

    • SHA1

      5248688b73e8a389d4a47eb8c1e6c198e1557a58

    • SHA256

      74fe04b93f0fff3d90bae6cbfb0ae162f442853f886588758d54d0c03e95940a

    • SHA512

      67fe04c28f73b768e6617193ea5b3c1bd8264ce5e0a72f90b755fed4298d3380a3e05ea40fd28eddbd6e9dbbab319b111613b93c58b9c7dac824dfebf1977df0

    • SSDEEP

      24576:LCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nH1:LCwsbCANnKXferL7Vwe/Gg0P+WhC/

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks