General

  • Target

    177ca7fbd7a09d86ee2fbc60310b5d0c21489f89b0a361d0b44ba93f33cb2f9f

  • Size

    2.7MB

  • Sample

    241228-2n92lstrhk

  • MD5

    1db8eb2158565e1b2c031f730fe9cba4

  • SHA1

    5f30ff405947fbf28e7d647acc572c2e82e536b6

  • SHA256

    177ca7fbd7a09d86ee2fbc60310b5d0c21489f89b0a361d0b44ba93f33cb2f9f

  • SHA512

    5dfd611c016d63fd85b5fcd46fc675c34a8f49b484f3efad7bbb40041df3f407ce6d48dd4b7650180e44a2bd459cf321e19ed78187ebdaae383ec994498b5a1e

  • SSDEEP

    24576:YCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHM:YCwsbCANnKXferL7Vwe/Gg0P+Who0aD0

Malware Config

Targets

    • Target

      177ca7fbd7a09d86ee2fbc60310b5d0c21489f89b0a361d0b44ba93f33cb2f9f

    • Size

      2.7MB

    • MD5

      1db8eb2158565e1b2c031f730fe9cba4

    • SHA1

      5f30ff405947fbf28e7d647acc572c2e82e536b6

    • SHA256

      177ca7fbd7a09d86ee2fbc60310b5d0c21489f89b0a361d0b44ba93f33cb2f9f

    • SHA512

      5dfd611c016d63fd85b5fcd46fc675c34a8f49b484f3efad7bbb40041df3f407ce6d48dd4b7650180e44a2bd459cf321e19ed78187ebdaae383ec994498b5a1e

    • SSDEEP

      24576:YCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHM:YCwsbCANnKXferL7Vwe/Gg0P+Who0aD0

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks