General

  • Target

    9034f1793dbf20ed6d7b5a35eb7ef3f26eae6d4d634a30d45946db67a05f2d3d

  • Size

    2.6MB

  • Sample

    241228-h567hawpdx

  • MD5

    fc9c004c36e7113a5b404148092d9d22

  • SHA1

    f57d116254bc87eea2d2de564de6e8ca03762360

  • SHA256

    9034f1793dbf20ed6d7b5a35eb7ef3f26eae6d4d634a30d45946db67a05f2d3d

  • SHA512

    f7f271ff72ad00bab371d0a0538034d9eed9ea01301da758094aa18ca212189a1c99a953c5550965dc9a2a96e1bba5006609e085aeeaee2d2ea9cef3353d4c61

  • SSDEEP

    49152:OCwsbCANnKXferL7Vwe/Gg0P+WhIsABTuI:pws2ANnKXOaeOgmhI1BTuI

Malware Config

Targets

    • Target

      9034f1793dbf20ed6d7b5a35eb7ef3f26eae6d4d634a30d45946db67a05f2d3d

    • Size

      2.6MB

    • MD5

      fc9c004c36e7113a5b404148092d9d22

    • SHA1

      f57d116254bc87eea2d2de564de6e8ca03762360

    • SHA256

      9034f1793dbf20ed6d7b5a35eb7ef3f26eae6d4d634a30d45946db67a05f2d3d

    • SHA512

      f7f271ff72ad00bab371d0a0538034d9eed9ea01301da758094aa18ca212189a1c99a953c5550965dc9a2a96e1bba5006609e085aeeaee2d2ea9cef3353d4c61

    • SSDEEP

      49152:OCwsbCANnKXferL7Vwe/Gg0P+WhIsABTuI:pws2ANnKXOaeOgmhI1BTuI

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks