General

  • Target

    239b950b58f92539d632689453cd37a38506be0a51778f4decd2377c050a0b82

  • Size

    1.7MB

  • Sample

    250106-b2m6ws1qdx

  • MD5

    b88618da47199a491035253366fe0d18

  • SHA1

    1dd4a6778874d3bb35b0726cffdbb9f3006c3b74

  • SHA256

    239b950b58f92539d632689453cd37a38506be0a51778f4decd2377c050a0b82

  • SHA512

    56abd967efd42cce55983263b130dd5b4cb9cc19eb31ede20d858da81cc85e572f5275974c6043f7fa1ea3b2b406e848456949d0485f27d78403b48ba4b86913

  • SSDEEP

    24576:uM8wcsjBocoT3cgEeqroaV3NSPDo7gKVbZETckLZzzb78QnDP:LSbfMhywSZ7N

Malware Config

Targets

    • Target

      239b950b58f92539d632689453cd37a38506be0a51778f4decd2377c050a0b82

    • Size

      1.7MB

    • MD5

      b88618da47199a491035253366fe0d18

    • SHA1

      1dd4a6778874d3bb35b0726cffdbb9f3006c3b74

    • SHA256

      239b950b58f92539d632689453cd37a38506be0a51778f4decd2377c050a0b82

    • SHA512

      56abd967efd42cce55983263b130dd5b4cb9cc19eb31ede20d858da81cc85e572f5275974c6043f7fa1ea3b2b406e848456949d0485f27d78403b48ba4b86913

    • SSDEEP

      24576:uM8wcsjBocoT3cgEeqroaV3NSPDo7gKVbZETckLZzzb78QnDP:LSbfMhywSZ7N

    • Detect PurpleFox Rootkit

      Detect PurpleFox Rootkit.

    • Gh0st RAT payload

    • Gh0strat

      Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

    • Gh0strat family

    • PurpleFox

      PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

    • Purplefox family

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks