General

  • Target

    d063275d97fda224eac36c29f1a239c568698b016062ff4859b158e8ffbe555c

  • Size

    3.9MB

  • Sample

    241228-tcatdazmcm

  • MD5

    c38b3786f89feeefd192c678411d49a8

  • SHA1

    c4b6f3ec8e1da9b89e28a258f10d115fa06fa3be

  • SHA256

    d063275d97fda224eac36c29f1a239c568698b016062ff4859b158e8ffbe555c

  • SHA512

    bb7f0e01b483463a07d6d9199358362a01da6ce8074ad2f4ffe68ac6c295b8e44d1dff481b1b4573e77769e0fbe80f3170032adbb4087a3325ae0fb7a10be421

  • SSDEEP

    49152:JCwsbCANnKXferL7Vwe/Gg0P+WhfCLEgR7hzWJmO:kws2ANnKXOaeOgmh6LEgNhyX

Malware Config

Targets

    • Target

      d063275d97fda224eac36c29f1a239c568698b016062ff4859b158e8ffbe555c

    • Size

      3.9MB

    • MD5

      c38b3786f89feeefd192c678411d49a8

    • SHA1

      c4b6f3ec8e1da9b89e28a258f10d115fa06fa3be

    • SHA256

      d063275d97fda224eac36c29f1a239c568698b016062ff4859b158e8ffbe555c

    • SHA512

      bb7f0e01b483463a07d6d9199358362a01da6ce8074ad2f4ffe68ac6c295b8e44d1dff481b1b4573e77769e0fbe80f3170032adbb4087a3325ae0fb7a10be421

    • SSDEEP

      49152:JCwsbCANnKXferL7Vwe/Gg0P+WhfCLEgR7hzWJmO:kws2ANnKXOaeOgmh6LEgNhyX

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks