General

  • Target

    1647de7b0df48df42bfb60cca35a332b86049cc0233bc00a2f17a70d08ab8250

  • Size

    2.6MB

  • Sample

    241228-2ntdvstnev

  • MD5

    a83d19c9ba27752533da7ecca0f7d480

  • SHA1

    ede0811ca33376414d7fa79dd58bc5b18799fbda

  • SHA256

    1647de7b0df48df42bfb60cca35a332b86049cc0233bc00a2f17a70d08ab8250

  • SHA512

    039475c6c99faf322bb9afdacf88029ec3576835d0b7587104b72c6b93b1f9ed40e19595d5be1c099603f390a9a28e8d22853ddedced4d96bbe0f56020c310ab

  • SSDEEP

    49152:OCwsbCANnKXferL7Vwe/Gg0P+WhIsABTuW:pws2ANnKXOaeOgmhI1BTuW

Malware Config

Targets

    • Target

      1647de7b0df48df42bfb60cca35a332b86049cc0233bc00a2f17a70d08ab8250

    • Size

      2.6MB

    • MD5

      a83d19c9ba27752533da7ecca0f7d480

    • SHA1

      ede0811ca33376414d7fa79dd58bc5b18799fbda

    • SHA256

      1647de7b0df48df42bfb60cca35a332b86049cc0233bc00a2f17a70d08ab8250

    • SHA512

      039475c6c99faf322bb9afdacf88029ec3576835d0b7587104b72c6b93b1f9ed40e19595d5be1c099603f390a9a28e8d22853ddedced4d96bbe0f56020c310ab

    • SSDEEP

      49152:OCwsbCANnKXferL7Vwe/Gg0P+WhIsABTuW:pws2ANnKXOaeOgmhI1BTuW

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks