General

  • Target

    46410e453c34b049670a683c15dd2eaaea4a10b1b94ed9155386e42d4bd971a8

  • Size

    2.6MB

  • Sample

    241228-2l9m3atmg1

  • MD5

    4078af2792b0af897fe15a15a72c7e28

  • SHA1

    a36a44212a1dcc69113b6139343284b17b4f0a23

  • SHA256

    46410e453c34b049670a683c15dd2eaaea4a10b1b94ed9155386e42d4bd971a8

  • SHA512

    300373dff0dd3da69d53542009626c7321bee7c20e43017441f533da1b07a2d59fda99113285c3439336d4053d116f6f1ecd86771419480b0912b215e0cd804c

  • SSDEEP

    49152:OCwsbCANnKXferL7Vwe/Gg0P+WhIsABTuL:pws2ANnKXOaeOgmhI1BTuL

Malware Config

Targets

    • Target

      46410e453c34b049670a683c15dd2eaaea4a10b1b94ed9155386e42d4bd971a8

    • Size

      2.6MB

    • MD5

      4078af2792b0af897fe15a15a72c7e28

    • SHA1

      a36a44212a1dcc69113b6139343284b17b4f0a23

    • SHA256

      46410e453c34b049670a683c15dd2eaaea4a10b1b94ed9155386e42d4bd971a8

    • SHA512

      300373dff0dd3da69d53542009626c7321bee7c20e43017441f533da1b07a2d59fda99113285c3439336d4053d116f6f1ecd86771419480b0912b215e0cd804c

    • SSDEEP

      49152:OCwsbCANnKXferL7Vwe/Gg0P+WhIsABTuL:pws2ANnKXOaeOgmhI1BTuL

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks