General

  • Target

    2928b84faac7baa13342981ba591c1e7fef4cc91447c7f9e67a4f374c4ae8635

  • Size

    2.7MB

  • Sample

    241229-b39fhsylem

  • MD5

    52a429d5b25adb78fc0fec50b7c09c13

  • SHA1

    1b620bc972a049b23487a59673b97daa115266de

  • SHA256

    2928b84faac7baa13342981ba591c1e7fef4cc91447c7f9e67a4f374c4ae8635

  • SHA512

    2458912827969449ce705c50e080f4c054421d653eca83e0d45e739e2ceaa5673c4c86f959869725cdb5532d95ef6ed702684838d8a2db4bef217139be74bdcf

  • SSDEEP

    49152:VCwsbCANnKXferL7Vwe/Gg0P+WhzsABTux:Iws2ANnKXOaeOgmhz1BTux

Malware Config

Targets

    • Target

      2928b84faac7baa13342981ba591c1e7fef4cc91447c7f9e67a4f374c4ae8635

    • Size

      2.7MB

    • MD5

      52a429d5b25adb78fc0fec50b7c09c13

    • SHA1

      1b620bc972a049b23487a59673b97daa115266de

    • SHA256

      2928b84faac7baa13342981ba591c1e7fef4cc91447c7f9e67a4f374c4ae8635

    • SHA512

      2458912827969449ce705c50e080f4c054421d653eca83e0d45e739e2ceaa5673c4c86f959869725cdb5532d95ef6ed702684838d8a2db4bef217139be74bdcf

    • SSDEEP

      49152:VCwsbCANnKXferL7Vwe/Gg0P+WhzsABTux:Iws2ANnKXOaeOgmhz1BTux

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks