General

  • Target

    fc492169e05686a491ad11dd5fb7f9b6c76cc8f3d4b58f576ad5f6e147401c87

  • Size

    2.6MB

  • Sample

    241228-2l9ytstmhy

  • MD5

    668ce4c064cd67a1e8aa7ff849d37309

  • SHA1

    4065576d0913e8bfdf574a0d8ad10731d527aa59

  • SHA256

    fc492169e05686a491ad11dd5fb7f9b6c76cc8f3d4b58f576ad5f6e147401c87

  • SHA512

    34dca79499b9477e9a39152b7cdaa24ad382151451d35073bd2fa9662dee84199ac0a1391dec894218ea1624b5b174373c6bf3d1b5e6cd776d93f2b2107d8f9c

  • SSDEEP

    49152:yCwsbCANnKXferL7Vwe/Gg0P+Wh0sABTuV:Vws2ANnKXOaeOgmh01BTuV

Malware Config

Targets

    • Target

      fc492169e05686a491ad11dd5fb7f9b6c76cc8f3d4b58f576ad5f6e147401c87

    • Size

      2.6MB

    • MD5

      668ce4c064cd67a1e8aa7ff849d37309

    • SHA1

      4065576d0913e8bfdf574a0d8ad10731d527aa59

    • SHA256

      fc492169e05686a491ad11dd5fb7f9b6c76cc8f3d4b58f576ad5f6e147401c87

    • SHA512

      34dca79499b9477e9a39152b7cdaa24ad382151451d35073bd2fa9662dee84199ac0a1391dec894218ea1624b5b174373c6bf3d1b5e6cd776d93f2b2107d8f9c

    • SSDEEP

      49152:yCwsbCANnKXferL7Vwe/Gg0P+Wh0sABTuV:Vws2ANnKXOaeOgmh01BTuV

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks