General

  • Target

    cec838f58787f19fe780be424574627bcb44ec5041f89a40b7ce1a8593444106

  • Size

    6.1MB

  • Sample

    241228-s7wtnazler

  • MD5

    ee7de747667128693a1de237bdc6830c

  • SHA1

    c87b0ee4f17da9cb81e8c4f610ebe9a438d9acae

  • SHA256

    cec838f58787f19fe780be424574627bcb44ec5041f89a40b7ce1a8593444106

  • SHA512

    073dadc95cbe111658e57343328fa9b3821b676d5b62a16f898603d020a5525dfe099cb41769c6058ab2473111834541a9a1f5013545eb518f93687269c97b52

  • SSDEEP

    98304:pws2ANnKXOaeOgmhI1BTuOZ+zSL6E9NkSy38jWLMMMyziqcrX6G5ijWAKJSQktZw:bKXbeO7S1pHwOWCkPzXeqE3ijWpH

Malware Config

Targets

    • Target

      cec838f58787f19fe780be424574627bcb44ec5041f89a40b7ce1a8593444106

    • Size

      6.1MB

    • MD5

      ee7de747667128693a1de237bdc6830c

    • SHA1

      c87b0ee4f17da9cb81e8c4f610ebe9a438d9acae

    • SHA256

      cec838f58787f19fe780be424574627bcb44ec5041f89a40b7ce1a8593444106

    • SHA512

      073dadc95cbe111658e57343328fa9b3821b676d5b62a16f898603d020a5525dfe099cb41769c6058ab2473111834541a9a1f5013545eb518f93687269c97b52

    • SSDEEP

      98304:pws2ANnKXOaeOgmhI1BTuOZ+zSL6E9NkSy38jWLMMMyziqcrX6G5ijWAKJSQktZw:bKXbeO7S1pHwOWCkPzXeqE3ijWpH

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.