General

  • Target

    5f5f961357850d41364b17c097a0948828d3c8f1bbc885bb854367b6d18be25f

  • Size

    3.6MB

  • Sample

    241228-2l99latmh1

  • MD5

    501ad66e4dafbd2a3dacb64d72eaadf4

  • SHA1

    b285e576a0110be13dd93d1b1d51f82a0fbed734

  • SHA256

    5f5f961357850d41364b17c097a0948828d3c8f1bbc885bb854367b6d18be25f

  • SHA512

    17e9362f038e337ef95512d96a9c9dc8474a9fc4945d644a500ea8a085c5dd8377b81519e074feb626f4c17ab92b59a185324083cad7539f5693f3d9947250da

  • SSDEEP

    49152:yCwsbCANnKXferL7Vwe/Gg0P+Wh0sABTuPZa7isbT3c:Vws2ANnKXOaeOgmh01BTugur

Malware Config

Targets

    • Target

      5f5f961357850d41364b17c097a0948828d3c8f1bbc885bb854367b6d18be25f

    • Size

      3.6MB

    • MD5

      501ad66e4dafbd2a3dacb64d72eaadf4

    • SHA1

      b285e576a0110be13dd93d1b1d51f82a0fbed734

    • SHA256

      5f5f961357850d41364b17c097a0948828d3c8f1bbc885bb854367b6d18be25f

    • SHA512

      17e9362f038e337ef95512d96a9c9dc8474a9fc4945d644a500ea8a085c5dd8377b81519e074feb626f4c17ab92b59a185324083cad7539f5693f3d9947250da

    • SSDEEP

      49152:yCwsbCANnKXferL7Vwe/Gg0P+Wh0sABTuPZa7isbT3c:Vws2ANnKXOaeOgmh01BTugur

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks