General

  • Target

    8a03ab8218a511ec5bdee8aa5ceb3b9ee3ee35fd08fca0a704cba79bafa2f239

  • Size

    2.2MB

  • Sample

    241230-a4cbqsskgj

  • MD5

    9fea24cff848a0c992ef554ef816ca4f

  • SHA1

    46960eaf33c9cbf7c6cabdd4888d05d53e9eb1c4

  • SHA256

    8a03ab8218a511ec5bdee8aa5ceb3b9ee3ee35fd08fca0a704cba79bafa2f239

  • SHA512

    4a0463b53d76295f7411170678057bf87c5fadbccd497adf8751df0da8c67992c419495f222fced34de1aafb8d1050844bd6038f3235bac0c56c19bb651962b6

  • SSDEEP

    49152:909XJt4HIN2H2tFvduyS7pekpEWoxv8ZPItx2apeapelI:eZJt4HINy2LkQkKZx1tUvlI

Malware Config

Targets

    • Target

      8a03ab8218a511ec5bdee8aa5ceb3b9ee3ee35fd08fca0a704cba79bafa2f239

    • Size

      2.2MB

    • MD5

      9fea24cff848a0c992ef554ef816ca4f

    • SHA1

      46960eaf33c9cbf7c6cabdd4888d05d53e9eb1c4

    • SHA256

      8a03ab8218a511ec5bdee8aa5ceb3b9ee3ee35fd08fca0a704cba79bafa2f239

    • SHA512

      4a0463b53d76295f7411170678057bf87c5fadbccd497adf8751df0da8c67992c419495f222fced34de1aafb8d1050844bd6038f3235bac0c56c19bb651962b6

    • SSDEEP

      49152:909XJt4HIN2H2tFvduyS7pekpEWoxv8ZPItx2apeapelI:eZJt4HINy2LkQkKZx1tUvlI

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks