General

  • Target

    12fde7642f171352ea88427887f8ea5cbdc75a4e69a281715feb03e1cd978fab

  • Size

    2.3MB

  • Sample

    241228-tnydtazje1

  • MD5

    0445d52b514f03eec8e7305e86ba08ec

  • SHA1

    e2f8da8a0e68e9b409289dba3993ba9823d27ba6

  • SHA256

    12fde7642f171352ea88427887f8ea5cbdc75a4e69a281715feb03e1cd978fab

  • SHA512

    2e2e0e2e850abde574e7b35c5d7879847fa3d16d3e2c15d5233027172945b486863adfc61d1709d30b372f88709836b58589ca9338e1de56d39cee85a7c568dd

  • SSDEEP

    24576:RCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHz:RCwsbCANnKXferL7Vwe/Gg0P+WhjtDsx

Malware Config

Targets

    • Target

      12fde7642f171352ea88427887f8ea5cbdc75a4e69a281715feb03e1cd978fab

    • Size

      2.3MB

    • MD5

      0445d52b514f03eec8e7305e86ba08ec

    • SHA1

      e2f8da8a0e68e9b409289dba3993ba9823d27ba6

    • SHA256

      12fde7642f171352ea88427887f8ea5cbdc75a4e69a281715feb03e1cd978fab

    • SHA512

      2e2e0e2e850abde574e7b35c5d7879847fa3d16d3e2c15d5233027172945b486863adfc61d1709d30b372f88709836b58589ca9338e1de56d39cee85a7c568dd

    • SSDEEP

      24576:RCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHz:RCwsbCANnKXferL7Vwe/Gg0P+WhjtDsx

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks