General

  • Target

    c5be2440e585cbc4de32314cbdae2e904b81e53d45d0597c1c484649615c9d69

  • Size

    4.3MB

  • Sample

    241228-s8bvwazlfm

  • MD5

    9ea97062269da599a23f3790e42fac71

  • SHA1

    962df0a7a496cb36cf5c1ae45920840ce3c53328

  • SHA256

    c5be2440e585cbc4de32314cbdae2e904b81e53d45d0597c1c484649615c9d69

  • SHA512

    0ad91722696880e005274c38f1dee612b145a8b64cda231562736a08451374efcb17d5f951a036d9c32f2e2891be48c0e15e36ed5ccd7b76272d9eb592e860e0

  • SSDEEP

    49152:eCwsbCANnKXferL7Vwe/Gg0P+WhnYeOazv2MRrTIGGiert88NXmckpe9Z:Zws2ANnKXOaeOgmhniMRrTIOe+8

Malware Config

Targets

    • Target

      c5be2440e585cbc4de32314cbdae2e904b81e53d45d0597c1c484649615c9d69

    • Size

      4.3MB

    • MD5

      9ea97062269da599a23f3790e42fac71

    • SHA1

      962df0a7a496cb36cf5c1ae45920840ce3c53328

    • SHA256

      c5be2440e585cbc4de32314cbdae2e904b81e53d45d0597c1c484649615c9d69

    • SHA512

      0ad91722696880e005274c38f1dee612b145a8b64cda231562736a08451374efcb17d5f951a036d9c32f2e2891be48c0e15e36ed5ccd7b76272d9eb592e860e0

    • SSDEEP

      49152:eCwsbCANnKXferL7Vwe/Gg0P+WhnYeOazv2MRrTIGGiert88NXmckpe9Z:Zws2ANnKXOaeOgmhniMRrTIOe+8

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks