General

  • Target

    1026b96d7021613b0f681fc5bf38ab6db69e593a8d5f7e093f9e690fcb174fa3

  • Size

    3.0MB

  • Sample

    241230-nw88dsxqgv

  • MD5

    0770f140fed75c414a6e4429e1a4272e

  • SHA1

    f473366c44069c9ffa2cfc74d91bb95d6cfd13eb

  • SHA256

    1026b96d7021613b0f681fc5bf38ab6db69e593a8d5f7e093f9e690fcb174fa3

  • SHA512

    a5d83f9174a69f5b83562ffed45913b15db0db0ce083d99e9fbdbb20e4185047f65927dbb1da5feb8149715ccaa58071ce7582d5df18a537e86c6a8a85e0dfef

  • SSDEEP

    49152:OCwsbCANnKXferL7Vwe/Gg0P+WhIsABTu04SvGyw6F:pws2ANnKXOaeOgmhI1BTu0eyw6F

Malware Config

Targets

    • Target

      1026b96d7021613b0f681fc5bf38ab6db69e593a8d5f7e093f9e690fcb174fa3

    • Size

      3.0MB

    • MD5

      0770f140fed75c414a6e4429e1a4272e

    • SHA1

      f473366c44069c9ffa2cfc74d91bb95d6cfd13eb

    • SHA256

      1026b96d7021613b0f681fc5bf38ab6db69e593a8d5f7e093f9e690fcb174fa3

    • SHA512

      a5d83f9174a69f5b83562ffed45913b15db0db0ce083d99e9fbdbb20e4185047f65927dbb1da5feb8149715ccaa58071ce7582d5df18a537e86c6a8a85e0dfef

    • SSDEEP

      49152:OCwsbCANnKXferL7Vwe/Gg0P+WhIsABTu04SvGyw6F:pws2ANnKXOaeOgmhI1BTu0eyw6F

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Server Software Component: Terminal Services DLL

    • Sets service image path in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks